microsoft azure security
play

Microsoft Azure Security Protecting mission-critical cloud Steve - PowerPoint PPT Presentation

Microsoft Azure Security Protecting mission-critical cloud Steve Faehl Microsoft US National Director Security Strategy Microsoft Azure, a strong foundation Azure Government The only Supports the broadest Physically Meets the most


  1. Microsoft Azure Security Protecting mission-critical cloud Steve Faehl Microsoft US National Director Security Strategy

  2. Microsoft Azure, a strong foundation Azure Government The only Supports the broadest Physically Meets the most Designed to exceed hyper-scale cloud selection separated instance complex compliance U.S. government built specifically for of services, tools, of Microsoft Azure standards requirements U.S. government and languages Microsoft Azure Intelligent Hybrid Trusted Productive 2

  3. Microsoft Azure, improving your security posture TRADITIONAL APPROACH CLOUD-ENABLED Cloud Technology enables security to: SECURITY Shift commodity responsibilities to provider and re-allocate your resources Unique Business Value Leverage cloud-based security capabilities for more effectiveness Use Cloud intelligence improve detection/response/time Commodity Resources Security is a challenging and under-resourced function Unmet responsibility Satisfied responsibility Cloud Provider responsibility Partially met responsibility

  4. Microsoft Threat Intelligence, 6.5 Trillion signals per day THREAT DATA SOURCES AND ANALYSIS TOOLS THREAT HUNTERS WORKFLOW SAMPLE TENANT SINKHOLES & DETONATION & SERVICES IR THREAT THREAT DISCOVERY THREAT INTEL AUTOMATION ZOOS DETECTIONS HONEYPOTS SANDBOXES INTELLIGENCE FEEDS AND TRACKING CURATION THREAT THREAT INTEL DATA BUS AS A SERVICE FIRST PARTY DETECTION TOOLS THREAT INTELLIGENCE PRODUCTION THREAT INTEL AS A SERVICE AZURE OFFICE 365 WINDOWS Next-gen Enhanced Enables Relevant, Accurate and analytics built correlation customer-focuse Actionable intelligence – from security driven by big d threat enriching the Intelligent Security awareness and data + machine intelligence Graph endpoint data learning

  5. Microsoft Azure, enabling a trusted and compliant cloud Dynamic and adaptive risk-based analysis and threat monitoring Blueprints for achieving continuous compliance with industry standards and organization initiatives NIST SP 800-53 R4 Hyper-scale cloud with 91 compliance frameworks built-in US GOV Moderate High DoD DISA DoD DISA DoD DISA SP FIPS Section 508 ITA CJI IRS 1075 JAB P-ATO JAB P-ATO SRG Level SRG Level SRG Level 800-171 140-2 VPAT R S 2 4 5

  6. Microsoft security, protecting innovation everywhere Security from chip to cloud Intelligent Cloud Intelligent Edge Applications Infrastructure Data Devices Identity Hybrid Agility Scale Innovation

  7. Microsoft Azure HPC Tim Carroll Microsoft US Director, Public Research

  8. • Primary hurdles are operational , budgetary and cultural • Traditional scoping, budgeting and evaluation practices do not align to evaluating cloud Impediments • Scarcity of in-house technical resources and reference customers creates challenge of “impartial” guidance to Cloud • 3 constituents: users, operations and management hold Adoption in different requirements and perspectives on cloud. Need to align to move forward effectively Federal • Cloud-specific tools and data management complicate multi-cloud strategy Agencies • The cloud providers struggle with this as well and are figuring this out as well

  9. • Infrastructure is the end, not the beginning • Cloud addresses the problem differently – and impacts procurement • Start at workflows and work back • Once the workloads are understood, cost are more accurate than the traditional extrapolation method If Only One • Greater performance and cost-efficiency will be realized in this step than any RFP, bake-off or price negotiation Thing … Start with the Workflow

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend