Notes of azure az-900 training
Tree:
Each service provides different options depending on your requirements. Some of the most prominent services are:
With App Service, you can host most common app service styles like:
Containers are managed through a container orchestrator, which can start, stop, and scale out application instances as needed. There are two ways to manage both Docker and Microsoft-based containers in Azure: Azure Container Instances and Azure Kubernetes Service (AKS).
Azure virtual networks provide the following key networking capabilities:
Is used to connect on-premises infrastructure with cloud services of azure. The connection is not encrypted.
Directly from ExpressRoute sites
Azure Blob Access tiers
Notes
nrsa: non-revenue services ssm: self service FOS: flight operation system
The common principles used to define a security posture are confidentiality, integrity, and availability, known collectively as CIA.
A firewall
is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.
You typically deploy Azure Firewall on a central virtual network to control general network access.
With Azure Firewall, you can configure:
A distributed denial of service attack attempts to overwhelm and exhaust an application’s resources, making the application slow or unresponsive to legitimate users. DDoS attacks can target any resource that’s publicly reachable through the internet, including websites.
A network security group enables you to filter network traffic to and from Azure resources within an Azure virtual network. You can think of NSGs like an internal firewall.
It establishes whether the user is who they say they are.
Authentication establishes the user’s identity, but authorization is the process of establishing what level of access an authenticated person or service has. It specifies what data they’re allowed to access and what they can do with it.
Multifactor authentication is a process where a user is prompted during the sign-in process for an additional form of identification. Examples include a code on their mobile phone or a fingerprint scan.
Multifactor authentication provides additional security for your identities by requiring two or more elements to fully authenticate.
These elements fall into three categories:
The term governance
describes the general process of establishing rules and policies and ensuring that those rules and policies are enforced.
Role-based access control is applied to a scope, which is a resource or set of resources that this access applies to.
Resource Manager
is a management service that provides a way to organize and secure your cloud resources.
Who does Azure RBAC (role-based access control) apply to?
To manage the RBAC you can go to the IAM section on the Azure portal.
A resource lock
prevents resources from being accidentally deleted or changed.
Resource locks apply regardless of RBAC permissions. Even if you’re an owner of the resource, you must still remove the lock before you can perform the blocked activity.
What if a cloud administrator accidentally deletes a resource lock? If the resource lock is removed, its associated resources can be changed or deleted.
To make the protection process more robust, you can combine resource locks with Azure Blueprints. Azure Blueprints enables you to define the set of standard Azure resources that your organization requires. For example, you can define a blueprint that specifies that a certain resource lock must exist. Azure Blueprints can automatically replace the resource lock if that lock is removed.
Interestingly we can use Azure DevOps and process resources with certain tag. We can also use tags for creating cost managament, security and governance and regulatory compliance.
You can also use Azure Policy to enforce tagging rules and conventions.
A tag consist of a name and value.
Website: Azure Policy - Getting started
Control and audit your resources by using Azure Policy.
Azure Policy enables you to define both individual policies and groups of related policies, known as initiatives
. Azure Policy evaluates your resources and highlights resources that aren’t compliant with the policies you’ve created. Azure Policy can also prevent noncompliant resources from being created.
A policiy consists of a