Az 900 Part3
Az 900 Part3
Az 900 Part3
Completed100 XP
6 minutes
Tailwind Traders is broadening its use of Azure services. It still has on-premises workloads with
current security-related configuration best practices and business procedures. How does the
company ensure that all of its systems meet a minimum level of security and that its
information is protected from attacks?
Many Azure services include built-in security features. Tools on Azure can also help Tailwind
Traders with this requirement. Let's start by looking at Azure Security Center.
What's Azure Security Center?
Azure Security Center is a monitoring service that provides visibility of your security posture
across all of your services, both on Azure and on-premises. The term security posture refers to
cybersecurity policies and controls, as well as how well you can predict, prevent, and respond
to security threats.
Security Center can:
Monitor security settings across on-premises and cloud workloads.
Automatically apply required security settings to new resources as they come online.
Provide security recommendations that are based on your current configurations, resources,
and networks.
Continuously monitor your resources and perform automatic security assessments to identify
potential vulnerabilities before those vulnerabilities can be exploited.
Use machine learning to detect and block malware from being installed on your virtual
machines (VMs) and other resources. You can also use adaptive application controls to define
rules that list allowed applications to ensure that only applications you allow can run.
Detect and analyze potential inbound attacks and investigate threats and any post-breach
activity that might have occurred.
Provide just-in-time access control for network ports. Doing so reduces your attack surface by
ensuring that the network only allows traffic that you require at the time that you need it to.
This short video explains how Security Center can help harden your networks, secure and
monitor your cloud resources, and improve your overall security posture.
Understand your security posture
Tailwind Traders can use Security Center to get a detailed analysis of different components in
its environment. Because the company's resources are analyzed against the security controls of
any governance policies it has assigned, it can view its overall regulatory compliance from a
security perspective all from one place.
See the following example of what you might see in Azure Security Center.
Let's say that Tailwind Traders must comply with the Payment Card Industry's Data Security
Standard (PCI DSS). This report shows that the company has resources that it needs to
remediate.
In the Resource security hygiene section, Tailwind Traders can see the health of its resources
from a security perspective. To help prioritize remediation actions, recommendations are
categorized as low, medium, and high. Here's an example.
Following the secure score recommendations can help protect your organization from threats.
From a centralized dashboard in Azure Security Center, organizations can monitor and work on
the security of their Azure resources like identities, data, apps, devices, and infrastructure.
Secure score helps you:
Report on the current state of your organization's security posture.
Improve your security posture by providing discoverability, visibility, guidance, and control.
Compare with benchmarks and establish key performance indicators (KPIs).
Protect against threats
Security Center includes advanced cloud defense capabilities for VMs, network security, and file
integrity. Let's look at how some of these capabilities apply to Tailwind Traders.
Just-in-time VM access Tailwind Traders will configure just-in-time access to VMs. This access
blocks traffic by default to specific network ports of VMs, but allows traffic for a specified time
when an admin requests and approves it.
Adaptive application controls Tailwind Traders can control which applications are allowed to
run on its VMs. In the background, Security Center uses machine learning to look at the
processes running on a VM. It creates exception rules for each resource group that holds the
VMs and provides recommendations. This process provides alerts that inform the company
about unauthorized applications that are running on its VMs.
Adaptive network hardening Security Center can monitor the internet traffic patterns of the
VMs, and compare those patterns with the company's current network security group (NSG)
settings. From there, Security Center can make recommendations about whether the NSGs
should be locked down further and provide remediation steps.
File integrity monitoring Tailwind Traders can also configure the monitoring of changes to
important files on both Windows and Linux, registry settings, applications, and other aspects
that might indicate a security attack.
Respond to security alerts
Tailwind Traders can use Security Center to get a centralized view of all of its security alerts.
From there, the company can dismiss false alerts, investigate them further, remediate alerts
manually, or use an automated response with a workflow automation.
Workflow automation uses Azure Logic Apps and Security Center connectors. The logic app can
be triggered by a threat detection alert or by a Security Center recommendation, filtered by
name or by severity. You can then configure the logic app to run an action, such as sending an
email, or posting a message to a Microsoft Teams channel.
Detect and respond to security threats by using Azure Sentinel
Completed100 XP
4 minutes
Security management on a large scale can benefit from a dedicated security information and
event management (SIEM) system. A SIEM system aggregates security data from many different
sources (as long as those sources support an open-standard logging format). It also provides
capabilities for threat detection and response.
Azure Sentinel is Microsoft's cloud-based SIEM system. It uses intelligent security analytics and
threat analysis.
Azure Sentinel capabilities
Azure Sentinel enables you to:
Collect cloud data at scale Collect data across all users, devices, applications, and infrastructure,
both on-premises and from multiple clouds.
Detect previously undetected threats Minimize false positives by using Microsoft's
comprehensive analytics and threat intelligence.
Investigate threats with artificial intelligence Examine suspicious activities at scale, tapping into
years of cybersecurity experience from Microsoft.
Respond to incidents rapidly Use built-in orchestration and automation of common tasks.
Connect your data sources
Tailwind Traders decides to explore the capabilities of Azure Sentinel. First, the company
identifies and connects its data sources.
Azure Sentinel supports a number of data sources, which it can analyze for security events.
These connections are handled by built-in connectors or industry-standard log formats and
APIs.
Connect Microsoft solutions Connectors provide real-time integration for services like Microsoft
Threat Protection solutions, Microsoft 365 sources (including Office 365), Azure Active
Directory, and Windows Defender Firewall.
Connect other services and solutions Connectors are available for common non-Microsoft
services and solutions, including AWS CloudTrail, Citrix Analytics (Security), Sophos XG Firewall,
VMware Carbon Black Cloud, and Okta SSO.
Connect industry-standard data sources Azure Sentinel supports data from other sources that
use the Common Event Format (CEF) messaging standard, Syslog, or REST API.
Detect threats
Tailwind Traders needs to be notified when something suspicious occurs. It decides to use both
built-in analytics and custom rules to detect threats.
Built in analytics use templates designed by Microsoft's team of security experts and analysts
based on known threats, common attack vectors, and escalation chains for suspicious activity.
These templates can be customized and search across the environment for any activity that
looks suspicious. Some templates use machine learning behavioral analytics that are based on
Microsoft proprietary algorithms.
Custom analytics are rules that you create to search for specific criteria within your
environment. You can preview the number of results that the query would generate (based on
past log events) and set a schedule for the query to run. You can also set an alert threshold.
Investigate and respond
When Azure Sentinel detects suspicious events, Tailwind Traders can investigate specific alerts
or incidents (a group of related alerts). With the investigation graph, the company can review
information from entities directly connected to the alert, and see common exploration queries
to help guide the investigation.
Here's an example that shows what an investigation graph looks like in Azure Sentinel.
The company will also use Azure Monitor Workbooks to automate responses to threats. For
example, it can set an alert that looks for malicious IP addresses that access the network and
create a workbook that does the following steps:
When the alert is triggered, open a ticket in the IT ticketing system.
Send a message to the security operations channel in Microsoft Teams or Slack to make sure
the security analysts are aware of the incident.
Send all of the information in the alert to the senior network admin and to the security admin.
The email message includes two user option buttons: Block or Ignore.
When an admin chooses Block, the IP address is blocked in the firewall, and the user is disabled
in Azure Active Directory. When an admin chooses Ignore, the alert is closed in Azure Sentinel,
and the incident is closed in the IT ticketing system.
The workbook continues to run after it receives a response from the admins.
Workbooks can be run manually or automatically when a rule triggers an alert.
Store and manage secrets by using Azure Key Vault
Completed100 XP
3 minutes
As Tailwind Traders builds its workloads in the cloud, it needs to carefully handle sensitive
information such as passwords, encryption keys, and certificates. This information needs to be
available for an application to function, but it might allow an unauthorized person access to
application data.
Azure Key Vault is a centralized cloud service for storing an application's secrets in a single,
central location. It provides secure access to sensitive information by providing access control
and logging capabilities.
What can Azure Key Vault do?
Azure Key Vault can help you:
Manage secrets You can use Key Vault to securely store and tightly control access to tokens,
passwords, certificates, API keys, and other secrets.
Manage encryption keys You can use Key Vault as a key management solution. Key Vault makes
it easier to create and control the encryption keys that are used to encrypt your data.
Manage SSL/TLS certificates Key Vault enables you to provision, manage, and deploy your
public and private Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates for both
your Azure resources and your internal resources.
Store secrets backed by hardware security modules (HSMs) These secrets and keys can be
protected either by software or by FIPS 140-2 Level 2 validated HSMs.
Here's an example that shows a certificate used for testing in Key Vault.
Each layer provides protection so that if one layer is breached, a subsequent layer is already in
place to prevent further exposure. This approach removes reliance on any single layer of
protection. It slows down an attack and provides alert telemetry that security teams can act
upon, either automatically or manually.
Here's a brief overview of the role of each layer:
The physical security layer is the first line of defense to protect computing hardware in the
datacenter.
The identity and access layer controls access to infrastructure and change control.
The perimeter layer uses distributed denial of service (DDoS) protection to filter large-scale
attacks before they can cause a denial of service for users.
The network layer limits communication between resources through segmentation and access
controls.
The compute layer secures access to virtual machines.
The application layer helps ensure that applications are secure and free of security
vulnerabilities.
The data layer controls access to business and customer data that you need to protect.
These layers provide a guideline for you to help make security configuration decisions in all of
the layers of your applications.
Azure provides security tools and features at every level of the defense-in-depth concept. Let's
take a closer look at each layer:
Physical security
Physically securing access to buildings and controlling access to computing hardware within the
datacenter are the first line of defense.
With physical security, the intent is to provide physical safeguards against access to assets. These
safeguards ensure that other layers can't be bypassed, and loss or theft is handled appropriately.
Microsoft uses various physical security mechanisms in its cloud datacenters.
Network
At this layer, it's important to:
Limit communication between resources.
Deny by default.
Restrict inbound internet access and limit outbound access where appropriate.
Implement secure connectivity to on-premises networks.
At this layer, the focus is on limiting the network connectivity across all your resources to allow
only what's required. By limiting this communication, you reduce the risk of an attack spreading
to other systems in your network.
Compute
At this layer, it's important to:
Secure access to virtual machines.
Implement endpoint protection on devices and keep systems patched and current.
Malware, unpatched systems, and improperly secured systems open your environment to attacks.
The focus in this layer is on making sure that your compute resources are secure and that you
have the proper controls in place to minimize security issues.
Application
At this layer, it's important to:
Ensure that applications are secure and free of vulnerabilities.
Store sensitive application secrets in a secure storage medium.
Make security a design requirement for all application development.
Integrating security into the application development lifecycle helps reduce the number of
vulnerabilities introduced in code. Every development team should ensure that its applications
are secure by default.
Data
In almost all cases, attackers are after data:
Stored in a database.
Stored on disk inside virtual machines.
Stored in software as a service (SaaS) applications, such as Office 365.
Managed through cloud storage.
Those who store and control access to data are responsible for ensuring that it's properly secured.
Often, regulatory requirements dictate the controls and processes that must be in place to ensure
the confidentiality, integrity, and availability of the data.
Security posture
Your security posture is your organization's ability to protect from and respond to security
threats. The common principles used to define a security posture are confidentiality, integrity,
and availability, known collectively as CIA.
Confidentiality
The principle of least privilege means restricting access to information only to individuals
explicitly granted access, at only the level that they need to perform their work. This
information includes protection of user passwords, email content, and access levels to
applications and underlying infrastructure.
Integrity
Prevent unauthorized changes to information:
At rest: when it's stored.
In transit: when it's being transferred from one place to another, including from a local
computer to the cloud.
A common approach used in data transmission is for the sender to create a unique fingerprint
of the data by using a one-way hashing algorithm. The hash is sent to the receiver along with
the data. The receiver recalculates the data's hash and compares it to the original to ensure
that the data wasn't lost or modified in transit.
Availability
Ensure that services are functioning and can be accessed only by authorized users. Denial-of-
service attacks are designed to degrade the availability of a system, affecting its users.
Protect virtual networks by using Azure Firewall
Completed100 XP
5 minutes
A firewall is a network security device that monitors incoming and outgoing network traffic and
decides whether to allow or block specific traffic based on a defined set of security rules. You
can create firewall rules that specify ranges of IP addresses. Only clients granted IP addresses
from within those ranges are allowed to access the destination server. Firewall rules can also
include specific network protocol and port information.
Tailwind Traders currently runs firewall appliances, which combine hardware and software, to
protect its on-premises network. These firewall appliances require a monthly licensing fee to
operate, and they require IT staff to perform routine maintenance. As Tailwind Traders moves
to the cloud, the IT manager wants to know what Azure services can protect both the
company's cloud networks and its on-premises networks.
In this part, you explore Azure Firewall.
What's Azure Firewall?
Azure Firewall is a managed, cloud-based network security service that helps protect resources
in your Azure virtual networks. A virtual network is similar to a traditional network that you'd
operate in your own datacenter. It's a fundamental building block for your private network that
enables virtual machines and other compute resources to securely communicate with each
other, the internet, and on-premises networks.
Here's a diagram that shows a basic Azure Firewall implementation:
Azure Firewall is a stateful firewall. A stateful firewall analyzes the complete context of a
network connection, not just an individual packet of network traffic. Azure Firewall features
high availability and unrestricted cloud scalability.
Azure Firewall provides a central location to create, enforce, and log application and network
connectivity policies across subscriptions and virtual networks. Azure Firewall uses a static
(unchanging) public IP address for your virtual network resources, which enables outside
firewalls to identify traffic coming from your virtual network. The service is integrated with
Azure Monitor to enable logging and analytics.
Azure Firewall provides many features, including:
Built-in high availability.
Unrestricted cloud scalability.
Inbound and outbound filtering rules.
Inbound Destination Network Address Translation (DNAT) support.
Azure Monitor logging.
You typically deploy Azure Firewall on a central virtual network to control general network
access.
This short video explains how Azure Firewall monitors incoming and outgoing network traffic
based a defined set of security rules. The video also explains how Azure Firewall compares to
traditional firewall appliances.
What can I configure with Azure Firewall?
With Azure Firewall, you can configure:
Application rules that define fully qualified domain names (FQDNs) that can be accessed from a
subnet.
Network rules that define source address, protocol, destination port, and destination address.
Network Address Translation (NAT) rules that define destination IP addresses and ports to
translate inbound requests.
Azure Application Gateway also provides a firewall that's called the web application
firewall (WAF). WAF provides centralized, inbound protection for your web applications against
common exploits and vulnerabilities. Azure Front Door and Azure Content Delivery
Network also provide WAF services.
Protect from DDoS attacks by using Azure DDoS Protection
Completed100 XP
3 minutes
Any large company can be the target of a large-scale network attack. Tailwind Traders is no
exception. Attackers might flood your network to make a statement or simply for the challenge.
As Tailwind Traders moves to the cloud, it wants to understand how Azure can help prevent
distributed denial of service (DDoS) and other attacks.
In this part, you learn how Azure DDoS Protection (Standard service tier) helps protect your
Azure resources from DDoS attacks. First, let's define what a DDoS attack is.
What are DDoS attacks?
A distributed denial of service attack attempts to overwhelm and exhaust an application's
resources, making the application slow or unresponsive to legitimate users. DDoS attacks can
target any resource that's publicly reachable through the internet, including websites.
What is Azure DDoS Protection?
Azure DDoS Protection (Standard) helps protect your Azure resources from DDoS attacks.
When you combine DDoS Protection with recommended application design practices, you help
provide a defense against DDoS attacks. DDoS Protection uses the scale and elasticity of
Microsoft's global network to bring DDoS mitigation capacity to every Azure region. The DDoS
Protection service helps protect your Azure applications by analyzing and discarding DDoS
traffic at the Azure network edge, before it can affect your service's availability.
This diagram shows network traffic flowing into Azure from both customers and an attacker:
DDoS Protection identifies the attacker's attempt to overwhelm the network and blocks further
traffic from them, ensuring that traffic never reaches Azure resources. Legitimate traffic from
customers still flows into Azure without any interruption of service.
DDoS Protection can also help you manage your cloud consumption. When you run on-
premises, you have a fixed number of compute resources. But in the cloud, elastic computing
means that you can automatically scale out your deployment to meet demand. A cleverly
designed DDoS attack can cause you to increase your resource allocation, which incurs
unneeded expense. DDoS Protection Standard helps ensure that the network load you process
reflects customer usage. You can also receive credit for any costs accrued for scaled-out
resources during a DDoS attack.
What service tiers are available to DDoS Protection?
DDoS Protection provides these service tiers:
Basic
The Basic service tier is automatically enabled for free as part of your Azure subscription.
Always-on traffic monitoring and real-time mitigation of common network-level attacks provide
the same defenses that Microsoft's online services use. The Basic service tier ensures that
Azure infrastructure itself is not affected during a large-scale DDoS attack.
The Azure global network is used to distribute and mitigate attack traffic across Azure regions.
Standard
The Standard service tier provides additional mitigation capabilities that are tuned specifically
to Azure Virtual Network resources. DDoS Protection Standard is relatively easy to enable and
requires no changes to your applications.
The Standard tier provides always-on traffic monitoring and real-time mitigation of common
network-level attacks. It provides the same defenses that Microsoft's online services use.
Protection policies are tuned through dedicated traffic monitoring and machine learning
algorithms. Policies are applied to public IP addresses, which are associated with resources
deployed in virtual networks such as Azure Load Balancer and Application Gateway.
The Azure global network is used to distribute and mitigate attack traffic across Azure regions.
What kinds of attacks can DDoS Protection help prevent?
The Standard service tier can help prevent:
Volumetric attacks
The goal of this attack is to flood the network layer with a substantial amount of seemingly
legitimate traffic.
Protocol attacks
These attacks render a target inaccessible by exploiting a weakness in the layer 3 and layer 4
protocol stack.
Resource-layer (application-layer) attacks (only with web application firewall)
These attacks target web application packets to disrupt the transmission of data between hosts.
You need a web application firewall (WAF) to protect against L7 attacks. DDoS Protection
Standard protects the WAF from volumetric and protocol attacks.
Filter network traffic by using network security groups
Completed100 XP
2 minutes
Although Azure Firewall and Azure DDoS Protection can help control what traffic can come
from outside sources, Tailwind Traders also wants to understand how to protect its internal
networks on Azure. Doing so will give the company an extra layer of defense against attacks.
In this part, you examine network security groups (NSGs).
What are network security groups?
A network security group enables you to filter network traffic to and from Azure resources
within an Azure virtual network. You can think of NSGs like an internal firewall. An NSG can
contain multiple inbound and outbound security rules that enable you to filter traffic to and
from resources by source and destination IP address, port, and protocol.
How do I specify NSG rules?
A network security group can contain as many rules as you need, within Azure subscription
limits. Each rule specifies these properties:
Property Description
Name A unique name for the NSG.
Priority A number between 100 and 4096. Rules are processed in priority order, with lower numbers
higher numbers.
Source or A single IP address or IP address range, service tag, or application security group.
Destination
Protocol TCP, UDP, or Any.
Direction Whether the rule applies to inbound or outbound traffic.
Port Range A single port or range of ports.
Action Allow or Deny.
When you create a network security group, Azure creates a series of default rules to provide a
baseline level of security. You can't remove the default rules, but you can override them by
creating new rules with higher priorities.
Combine Azure services to create a complete network security solution
Completed100 XP
3 minutes
When you're considering an Azure security solution, consider all the elements of defense in
depth.
Here are some recommendations on how to combine Azure services to create a complete
network security solution.
Secure the perimeter layer
The perimeter layer is about protecting your organization's resources from network-based
attacks. Identifying these attacks, alerting the appropriate security teams, and eliminating their
impact are important to keeping your network secure. To do this:
Use Azure DDoS Protection to filter large-scale attacks before they can cause a denial of service
for users.
Use perimeter firewalls with Azure Firewall to identify and alert on malicious attacks against
your network.
Secure the network layer
At this layer, the focus is on limiting network connectivity across all of your resources to allow
only what's required. Segment your resources and use network-level controls to restrict
communication to only what's needed.
By restricting connectivity, you reduce the risk of lateral movement throughout your network
from an attack. Use network security groups to create rules that define allowed inbound and
outbound communication at this layer. Here are some recommended practices:
Limit communication between resources by segmenting your network and configuring access
controls.
Deny by default.
Restrict inbound internet access and limit outbound where appropriate.
Implement secure connectivity to on-premises networks.
Combine services
You can combine Azure networking and security services to manage your network security and
provide increased layered protection. Here are two ways you can combine services:
Network security groups and Azure Firewall
Azure Firewall complements the functionality of network security groups. Together, they
provide better defense-in-depth network security.
Network security groups provide distributed network-layer traffic filtering to limit traffic to
resources within virtual networks in each subscription.
Azure Firewall is a fully stateful, centralized network firewall as a service. It provides network-
level and application-level protection across different subscriptions and virtual networks.
Azure Application Gateway web application firewall and Azure Firewall
Web application firewall (WAF) is a feature of Azure Application Gateway that provides your
web applications with centralized, inbound protection against common exploits and
vulnerabilities.
Azure Firewall provides:
Inbound protection for non-HTTP/S protocols (for example, RDP, SSH, and FTP).
Outbound network-level protection for all ports and protocols.
Application-level protection for outbound HTTP/S.
Combining them provides more layers of protection.
Compare authentication and authorization
Completed100 XP
2 minutes
Recall that Tailwind Traders must ensure that only employees can sign in and access its business
applications.
Tailwind Traders also needs to ensure that employees can access only authorized applications.
For example, all employees can access inventory and pricing software, but only store managers
can access payroll and certain accounting software.
Two fundamental concepts that you need to understand when talking about identity and access
are authentication (AuthN) and authorization (AuthZ).
Authentication and authorization both support everything else that happens. They occur
sequentially in the identity and access process.
Let's take a brief look at each.
What is authentication?
Authentication is the process of establishing the identity of a person or service that wants to
access a resource. It involves the act of challenging a party for legitimate credentials and
provides the basis for creating a security principal for identity and access control. It establishes
whether the user is who they say they are.
What is authorization?
Authentication establishes the user's identity, but authorization is the process of establishing
what level of access an authenticated person or service has. It specifies what data they're
allowed to access and what they can do with it.
How are authentication and authorization related?
Here's a diagram that shows the relationship between authentication and authorization:
The identification card represents credentials that the user has to prove their identity (you'll
learn more about the types of credentials later in this module.) Once authenticated,
authorization defines what kinds of applications, resources, and data that user can access.
What is Azure Active Directory?
Completed100 XP
5 minutes
In this part, you learn how Azure Active Directory (Azure AD) provides identity services that
enable your users to sign in and access both Microsoft cloud applications and cloud applications
that you develop. You also learn how Azure AD supports single sign-on (SSO).
Tailwind Traders already uses Active Directory to secure its on-premises environments. The
company doesn't want its users to have a different username and password to remember for
accessing applications and data in the cloud. Can the company integrate its existing Active
Directory instance with cloud identity services to create a seamless experience for its users?
Let's start with how Azure AD compares to Active Directory.
How does Azure AD compare to Active Directory?
Active Directory is related to Azure AD, but they have some key differences.
Microsoft introduced Active Directory in Windows 2000 to give organizations the ability to
manage multiple on-premises infrastructure components and systems by using a single identity
per user.
For on-premises environments, Active Directory running on Windows Server provides an
identity and access management service that's managed by your own organization. Azure AD is
Microsoft's cloud-based identity and access management service. With Azure AD, you control
the identity accounts, but Microsoft ensures that the service is available globally. If you've
worked with Active Directory, Azure AD will be familiar to you.
When you secure identities on-premises with Active Directory, Microsoft doesn't monitor sign-
in attempts. When you connect Active Directory with Azure AD, Microsoft can help protect you
by detecting suspicious sign-in attempts at no extra cost. For example, Azure AD can detect
sign-in attempts from unexpected locations or unknown devices.
Who uses Azure AD?
Azure AD is for:
IT administrators
Administrators can use Azure AD to control access to applications and resources based on their
business requirements.
App developers
Developers can use Azure AD to provide a standards-based approach for adding functionality to
applications that they build, such as adding SSO functionality to an app or enabling an app to
work with a user's existing credentials.
Users
Users can manage their identities. For example, self-service password reset enables users to
change or reset their password with no involvement from an IT administrator or help desk.
Online service subscribers
Microsoft 365, Microsoft Office 365, Azure, and Microsoft Dynamics CRM Online subscribers
are already using Azure AD.
A tenant is a representation of an organization. A tenant is typically separated from other
tenants and has its own identity.
Each Microsoft 365, Office 365, Azure, and Dynamics CRM Online tenant is automatically an
Azure AD tenant.
Here's a screenshot of what an IT administrator might see in the Azure portal when working
with Active Directory:
Scopes include:
A management group (a collection of multiple subscriptions).
A single subscription.
A resource group.
A single resource.
Observers, Users managing resources, Admins, and Automated processes illustrate the kinds of
users or accounts that would typically be assigned each of the various roles.
When you grant access at a parent scope, those permissions are inherited by all child scopes.
For example:
When you assign the Owner role to a user at the management group scope, that user can
manage everything in all subscriptions within the management group.
When you assign the Reader role to a group at the subscription scope, the members of that
group can view every resource group and resource within the subscription.
When you assign the Contributor role to an application at the resource group scope, the
application can manage resources of all types within that resource group, but not other
resource groups within the subscription.
When should I use Azure RBAC?
Use Azure RBAC when you need to:
Allow one user to manage VMs in a subscription and another user to manage virtual networks.
Allow a database administrator group to manage SQL databases in a subscription.
Allow a user to manage all resources in a resource group, such as virtual machines, websites,
and subnets.
Allow an application to access all resources in a resource group.
These are just a few examples. You'll find the complete list of built-in roles at the end of this
module.
How is Azure RBAC enforced?
Azure RBAC is enforced on any action that's initiated against an Azure resource that passes
through Azure Resource Manager. Resource Manager is a management service that provides a
way to organize and secure your cloud resources.
You typically access Resource Manager from the Azure portal, Azure Cloud Shell, Azure
PowerShell, and the Azure CLI. Azure RBAC doesn't enforce access permissions at the
application or data level. Application security must be handled by your application.
RBAC uses an allow model. When you're assigned a role, RBAC allows you to perform certain
actions, such as read, write, or delete. If one role assignment grants you read permissions to a
resource group and a different role assignment grants you write permissions to the same
resource group, you have both read and write permissions on that resource group.
Who does Azure RBAC apply to?
You can apply Azure RBAC to an individual person or to a group. You can also apply Azure RBAC
to other special identity types, such as service principals and managed identities. These identity
types are used by applications and services to automate access to Azure resources.
Tailwind Traders has the following teams with an interest in some part of their overall IT
environment:
IT Administrators This team has ultimate ownership of technology assets, both on-premises and
in the cloud. The team requires full control of all resources.
Backup and Disaster Recovery This team is responsible for managing the health of regular
backups and invoking any data or system recoveries.
Cost and Billing People in this team track and report on technology-related spend. They also
manage the organization's internal budgets.
Security Operations This team monitors and responds to any technology-related security
incidents. The team requires ongoing access to log files and security alerts.
How do I manage Azure RBAC permissions?
You manage access permissions on the Access control (IAM) pane in the Azure portal. This pane
shows who has access to what scope and what roles apply. You can also grant or remove access
from this pane.
The following screenshot shows an example of the Access control (IAM) pane for a resource
group. In this example, Alain Charon has been assigned the Backup Operator role for this
resource group.
At the prompt, enter my-test-rg, and then select OK. You see a message that tells you that the
resource group is locked and can't be deleted.
You see a message that tells you the resource or its parent is locked and can't be deleted.
Here's an example that shows the error message for a storage account that's named mysa1234.
Although you didn't create a lock specifically for the storage account, the lock you created for
the parent resource group prevents you from deleting the resource. In other words, the storage
account inherits the lock from the parent resource group.
Delete the resource group and the storage account
You no longer need your resource group or storage account. Here you remove both.
When you delete a resource group, you also delete its child resources, such as the storage
account you previously created.
To delete the resource group, you first need to remove the resource lock.
From the Azure portal, select Home > Resource groups > my-test-rg to go to your resource
group.
Under Settings, select Locks.
Locate rg-delete-lock, and select Delete on that same row.
Select Overview, and then select Delete resource group.
At the prompt, enter my-test-rg, and then select OK. The deletion operation might take a few
moments to complete.
When the operation completes, select Home > Resource groups. You see that the my-test-
rg resource group no longer exists in your account. Your storage account is also deleted.
Nice work. You can now apply resource locks to help prevent the accidental deletion of your
Azure resources.
Organize your Azure resources by using tags
Completed100 XP
3 minutes
As your cloud usage grows, it's increasingly important to stay organized. A good organization
strategy helps you understand your cloud usage and can help you manage costs.
For example, as Tailwind Traders prototypes new ways to deploy its applications on Azure, it
needs a way to mark its test environments so that it can easily identify and delete resources in
these environments when they're no longer needed.
One way to organize related resources is to place them in their own subscriptions. You can also
use resource groups to manage related resources. Resource tags are another way to organize
resources. Tags provide extra information, or metadata, about your resources. This metadata is
useful for:
Resource management Tags enable you to locate and act on resources that are associated with
specific workloads, environments, business units, and owners.
Cost management and optimization Tags enable you to group resources so that you can report
on costs, allocate internal cost centers, track budgets, and forecast estimated cost.
Operations management Tags enable you to group resources according to how critical their
availability is to your business. This grouping helps you formulate service-level agreements
(SLAs). An SLA is an uptime or performance guarantee between you and your users.
Security Tags enable you to classify data by its security level, such as public or confidential.
Governance and regulatory compliance Tags enable you to identify resources that align with
governance or regulatory compliance requirements, such as ISO 27001. Tags can also be part of
your standards enforcement efforts. For example, you might require that all resources be
tagged with an owner or department name.
Workload optimization and automation Tags can help you visualize all of the resources that
participate in complex deployments. For example, you might tag a resource with its associated
workload or application name and use software such as Azure DevOps to perform automated
tasks on those resources.
How do I manage resource tags?
You can add, modify, or delete resource tags through PowerShell, the Azure CLI, Azure
Resource Manager templates, the REST API, or the Azure portal.
You can also manage tags by using Azure Policy. For example, you can apply tags to a resource
group, but those tags aren't automatically applied to the resources within that resource group.
You can use Azure Policy to ensure that a resource inherits the same tags as its parent resource
group. You'll learn more about Azure Policy later in this module.
You can also use Azure Policy to enforce tagging rules and conventions. For example, you can
require that certain tags be added to new resources as they're provisioned. You can also define
rules that reapply tags that have been removed.
An example tagging structure
A resource tag consists of a name and a value. You can assign one or more tags to each Azure
resource.
After reviewing its business requirements, Tailwind Traders decides on the following tags.
Name
Value
AppName
The name of the application that the resource is part of.
CostCenter
The internal cost center code.
Owner
The name of the business owner who's responsible for the resource.
Environment
An environment name, such as "Prod," "Dev," or "Test."
Impact
How important the resource is to business operations, such as "Mission-critical," "High-impact,"
or "Low-impact."
Here's an example that shows these tags as they're applied to a virtual machine during
provisioning.
The Tailwind Traders team can run queries, for example, from PowerShell or the Azure CLI, to
list all resources that contain these tags.
Keep in mind that you don't need to enforce that a specific tag is present on all of your
resources. For example, you might decide that only mission-critical resources have
the Impact tag. All non-tagged resources would then not be considered as mission-critical.
Control and audit your resources by using Azure Policy
Completed100 XP
5 minutes
In a previous exercise in this module, you identified your governance and business
requirements. How do you ensure that your resources stay compliant? Can you be alerted if a
resource's configuration has changed?
Azure Policy is a service in Azure that enables you to create, assign, and manage policies that
control or audit your resources. These policies enforce different rules across all of your resource
configurations so that those configurations stay compliant with corporate standards.
How does Azure Policy define policies?
Azure Policy enables you to define both individual policies and groups of related policies,
known as initiatives. Azure Policy evaluates your resources and highlights resources that aren't
compliant with the policies you've created. Azure Policy can also prevent noncompliant
resources from being created.
Azure Policy comes with built-in policy and initiative definitions for Storage, Networking,
Compute, Security Center, and Monitoring. For example, if you define a policy that allows only a
certain SKU (stock-keeping unit) size for the virtual machines (VMs) to be used in your
environment, that policy is invoked when you create a new VM and whenever you resize
existing VMs. Azure Policy also evaluates and monitors all current VMs in your environment.
In some cases, Azure Policy can automatically remediate noncompliant resources and
configurations to ensure the integrity of the state of the resources. For example, if all resources
in a certain resource group should be tagged with AppName tag and a value of "SpecialOrders,"
Azure Policy will automatically reapply that tag if it was missing.
Azure Policy also integrates with Azure DevOps by applying any continuous integration and
delivery pipeline policies that pertain to the pre-deployment and post-deployment phases of
your applications.
Azure Policy in action
Implementing a policy in Azure Policy involves three tasks:
Create a policy definition.
Assign the definition to resources.
Review the evaluation results.
Let's examine each step in more detail.
Task 1. Create a policy definition
A policy definition expresses what to evaluate and what action to take. For example, you could
prevent VMs from being deployed in certain Azure regions. You also could audit your storage
accounts to verify that they only accept connections from allowed networks.
Every policy definition has conditions under which it's enforced. A policy definition also has an
accompanying effect that takes place when the conditions are met. Here are some example
policy definitions:
Allowed virtual machine SKUs This policy enables you to specify a set of VM SKUs that your
organization can deploy.
Allowed locations This policy enables you to restrict the locations that your organization can
specify when it deploys resources. Its effect is used to enforce your geographic compliance
requirements.
MFA should be enabled on accounts with write permissions on your subscription This policy
requires that multifactor authentication (MFA) be enabled for all subscription accounts with
write privileges to prevent a breach of accounts or resources.
CORS should not allow every resource to access your web applications Cross-origin resource
sharing (CORS) is an HTTP feature that enables a web application running under one domain to
access resources in another domain. For security reasons, modern web browsers restrict cross-
site scripting by default. This policy allows only required domains to interact with your web app.
System updates should be installed on your machines This policy enables Azure Security Center
to recommend missing security system updates on your servers.
Task 2. Assign the definition to resources
To implement your policy definitions, you assign definitions to resources. A policy assignment is
a policy definition that takes place within a specific scope. This scope could be a management
group (a collection of multiple subscriptions), a single subscription, or a resource group.
Policy assignments are inherited by all child resources within that scope. If a policy is applied to
a resource group, that policy is applied to all resources within that resource group. You can
exclude a subscope from the policy assignment if there are specific child resources you need to
be exempt from the policy assignment.
Task 3. Review the evaluation results
When a condition is evaluated against your existing resources, each resource is marked as
compliant or noncompliant. You can review the noncompliant policy results and take any action
that's needed.
Policy evaluation happens about once per hour. If you make changes to your policy definition
and create a policy assignment, that policy is evaluated over your resources within the hour.
What are Azure Policy initiatives?
An Azure Policy initiative is a way of grouping related policies together. The initiative definition
contains all of the policy definitions to help track your compliance state for a larger goal.
For example, Azure Policy includes an initiative named Enable Monitoring in Azure Security
Center. Its goal is to monitor all of the available security recommendations for all Azure
resource types in Azure Security Center.
Under this initiative, the following policy definitions are included:
Monitor unencrypted SQL Database in Security Center This policy monitors for unencrypted SQL
databases and servers.
Monitor OS vulnerabilities in Security Center This policy monitors servers that don't satisfy the
configured OS vulnerability baseline.
Monitor missing Endpoint Protection in Security Center This policy monitors for servers that
don't have an installed endpoint protection agent.
In fact, the Enable Monitoring in Azure Security Center initiative contains over 100 separate
policy definitions.
Azure Policy also includes initiatives that support regulatory compliance standards, such as
HIPAA and ISO 27001.
How do I define an initiative?
You define initiatives by using the Azure portal or command-line tools. From the Azure portal,
you can search the list of built-in initiatives that are built into Azure. You also can create your
own custom policy definition.
The following image shows a few example Azure Policy initiatives in the Azure portal.
How do I assign an initiative?
Like a policy assignment, an initiative assignment is an initiative definition that's assigned to a
specific scope of a management group, a subscription, or a resource group.
Even if you have only a single policy, an initiative enables you to increase the number of policies
over time. Because the associated initiative remains assigned, it's easier to add and remove
policies without the need to change the policy assignment for your resources.
Exercise - Restrict deployments to a specific location by using Azure Policy
Completed100 XP
8 minutes
In this exercise, you create a policy in Azure Policy that restricts the deployment of Azure
resources to a specific location. You verify the policy by attempting to create a storage account
in a location that violates the policy.
Tailwind Traders wants to limit the location where resources can be deployed to the East
US region. It has two reasons:
Improved cost tracking To track costs, Tailwind Traders uses different subscriptions to track
deployments to each of its regional locations. The policy will ensure that all resources are
deployed to the East US region.
Adhere to data residency and security compliance Tailwind Traders must adhere to a
compliance rule that states where customer data can be stored. Here, customer data must be
stored in the East US region.
Recall that you can assign a policy to a management group, a single subscription, or a resource
group. Here, you assign the policy to a resource group so that policy doesn't affect any other
resources in your Azure subscription.
Important
You need your own Azure subscription to complete the exercises in this module. If you don't
have an Azure subscription, you can still read along.
Create the resource group
Here you create a resource group that's named my-test-rg. This is the resource group to which
you'll apply your location policy.
For learning purposes, you use the same resource group name that you used in the previous
exercise. You can use the same name because you deleted the previous resource group.
Go to the Azure portal, and sign in.
Select Create a resource.
Enter resource group in the search box, and press Enter.
If you're taken to a search results pane, select Resource group from the results.
Select Create. Then, enter the following values for each setting.
Setting
Value
Subscription
(Your Azure subscription)
Subscription > Resource group
my-test-rg
Region
(US) East US
Select Review + create, and then select Create.
Explore predefined policies
Before you configure your location policy, let's take a brief look at some predefined policies. As
an example, you'll look at policies that relate to Azure Compute services.
From the Azure portal, at the top of the page, select Home to return to the start page.
At the top of the page, enter policy in the search bar. Then, select Policy from the list of results
to access Azure Policy.
Under Authoring, select Definitions.
From the Category dropdown list, select only Compute. Notice that the Allowed virtual machine
SKUs definition enables you to specify a set of virtual machine SKUs that your organization can
deploy.
As an optional step, explore any other policies or categories that interest you.
Configure the location policy
Here you configure the allowed location policy by using Azure Policy. Then you assign that
policy to your resource group. To do so:
From the Policy pane, under Authoring, select Assignments.
An assignment is a policy that has been assigned to take place within a specific scope. For
example, a definition could be assigned to the subscription scope.
Select Assign Policy.
This policy definition specifies the location into which all resources must be deployed. If a
different location is chosen, deployment will fail.
Select Next to move to the Parameters tab.
From the Allowed locations dropdown list, select East US.
Select Review + create, and then select Create.
You see that the Allowed locations policy assignment is now listed on the Policy |
Assignments pane. It enforces the policy on the my-test-rg resource group.
You can specify a parameter's value when you create the blueprint definition or when you
assign the blueprint definition to a scope. In this way, you can maintain one standard blueprint
but have the flexibility to specify the relevant configuration parameters at each scope where
the definition is assigned.
How will Tailwind Traders use Azure Blueprints for ISO 27001
compliance?
ISO 27001 is a standard that applies to the security of IT systems, published by the International
Organization for Standardization. As part of its quality process, Tailwind Traders wants to certify
that it complies with this standard. Azure Blueprints has several built-in blueprint definitions
that relate to ISO 27001.
As an IT administrator, you decide to investigate the ISO 27001: Shared Services
Blueprint definition. Here's an outline of your plan.
Define a management group that's named PROD-MG. Recall that a management group
manages access, policies, and compliance across multiple Azure subscriptions. Every new Azure
subscription is added to this management group when the subscription is created.
Create a blueprint definition that's based on the ISO 27001: Shared Services Blueprint template.
Then publish the blueprint.
Assign the blueprint to your PROD-MG management group.
The following image shows artifacts that are created when you run an ISO 27001 blueprint from
a template.
You see that the blueprint template contains policy assignments, Resource Manager templates,
and resource groups. The blueprint deploys these artifacts to any existing subscriptions within
the PROD-MG management group. The blueprint also deploys these artifacts to any new
subscriptions as they're created and added to the management group.
Accelerate your cloud adoption journey by using the Cloud Adoption Framework for Azure
Completed100 XP
3 minutes
The Cloud Adoption Framework for Azure provides you with proven guidance to help with your
cloud adoption journey. The Cloud Adoption Framework helps you create and implement the
business and technology strategies needed to succeed in the cloud.
Tailwind Traders needs to control its cloud environment so that it complies with several
industry standards, but it's not sure where to start. It has existing business requirements, and it
understands how these requirements relate to its on-premises workloads. These requirements
also must be met by any workloads it runs in the cloud.
You've been tasked with investigating what's available on Azure and to define and implement
the governance strategy for Tailwind Traders. You decide to start with the Cloud Adoption
Framework.
What's in the Cloud Adoption Framework?
As mentioned in the video, Cloud Adoption Framework consists of tools, documentation, and
proven practices. The Cloud Adoption Framework includes these stages:
Define your strategy.
Make a plan.
Ready your organization.
Adopt the cloud.
Govern and manage your cloud environments.
The govern stage focuses on cloud governance. You can refer back to the Cloud Adoption
Framework for recommended guidance as you build your cloud governance strategy.
To help build your adoption strategy, the Cloud Adoption Framework breaks out each stage into
further exercises and steps. Let's take a brief look at each stage.
Define your strategy
Here, you answer why you're moving to the cloud and what you want to get out of cloud
migration. Do you need to scale to meet demand or reach new markets? Will it reduce costs or
increase business agility? When you define your cloud business strategy, you should
understand cloud economics and consider business impact, turnaround time, global reach,
performance, and more.
Here are the steps in this stage.
Define and document your motivations: Meeting with stakeholders and leadership can help you
answer why you're moving to the cloud.
Document business outcomes: Meet with leadership from your finance, marketing, sales, and
human resource groups to help you document your goals.
Evaluate financial considerations: Measure objectives and identify the return expected from a
specific investment.
Skills readiness plan: Build a plan that helps individuals build the skills they need to operate in
the cloud.
Cloud adoption plan: Build a comprehensive plan that brings together the development,
operations, and business teams toward a shared cloud adoption goal.
Azure landing zone: Begin to build out the Azure subscriptions that support each of the major
areas of your business. A landing zone includes cloud infrastructure as well as governance,
accounting, and security capabilities.
Expand the landing zone: Refine your landing zone to ensure that it meets your operations,
governance, and security needs.
Best practices: Start with recommended and proven practices to help ensure that your cloud
migration efforts are scalable and maintainable.
Adopt the cloud
Here, you begin to migrate your applications to the cloud. Along the way, you might find ways
to modernize your applications and build innovative solutions that use cloud services.
The Cloud Adoption Framework breaks this stage into two parts: migrate and innovate.
Migrate: Here are the steps in the migrate part of this stage.
Migrate your first workload: Use the Azure migration guide to deploy your first project to the
cloud.
Migration scenarios: Use additional in-depth guides to explore more complex migration
scenarios.
Best practices: Check in with the Azure cloud migration best practices checklist to verify that
you're following recommended practices.
Process improvements: Identify ways to make the migration process scale while requiring less
effort.
Innovate: Here are the steps in the innovate part of this stage.
Business value consensus: Verify that investments in new innovations add value to the business
and meet customer needs.
Azure innovation guide: Use this guide to accelerate development and build a minimum viable
product (MVP) for your idea.
Best practices: Verify that your progress maps to recommended practices before you move
forward.
Feedback loops: Check in frequently with your customers to verify that you're building what
they need.
Govern and manage your cloud environments
Here, you begin to form your cloud governance and cloud management strategies. As the cloud
estate changes over time, so do cloud governance processes and policies. You need to create
resilient solutions that are constantly optimized.
Govern: Here are the steps in the govern part of this stage.
Methodology: Consider your end state solution. Then define a methodology that incrementally
takes you from your first steps all the way to full cloud governance.
Benchmark: Use the governance benchmark tool to assess your current state and future state to
establish a vision for applying the framework.
Initial governance foundation: Create an MVP that captures the first steps of your governance
plan.
Improve the initial governance foundation: Iteratively add governance controls that address
tangible risks as you progress toward your end state solution.
Manage: Here are the steps in the manage part of this stage.
Expand the management baseline: Apply recommended best practices to iterate on your initial
management baseline.
Advanced operations and design principles: For workloads that require a higher level of business
commitment, perform a deeper architecture review to deliver on your resiliency and reliability
commitments.
Create a subscription governance strategy
Completed100 XP
3 minutes
At the beginning of any cloud governance implementation, you identify a cloud organization
structure that meets your business needs. This step often involves forming a cloud center of
excellence team (also called a cloud enablement team or a cloud custodian team). This team is
empowered to implement governance practices from a centralized location for the entire
organization.
Teams often start their Azure governance strategy at the subscription level. There are three
main aspects to consider when you create and manage subscriptions: billing, access control,
and subscription limits.
Let's look at each of these aspects in more detail.
Billing
You can create one billing report per subscription. If you have multiple departments and need
to do a "chargeback" of cloud costs, one possible solution is to organize subscriptions by
department or by project.
Resource tags can also help. You'll explore tags later in this module. When you define how
many subscriptions you need and what to name them, take into account your internal billing
requirements.
Access control
A subscription is a deployment boundary for Azure resources. Every subscription is associated
with an Azure Active Directory tenant. Each tenant provides administrators the ability to set
granular access through defined roles by using Azure role-based access control.
When you design your subscription architecture, consider the deployment boundary factor. For
example, do you need separate subscriptions for development and for production
environments? With separate subscriptions, you can control access to each one separately and
isolate their resources from one another.
Subscription limits
Subscriptions also have some resource limitations. For example, the maximum number of
network Azure ExpressRoute circuits per subscription is 10. Those limits should be considered
during your design phase. If you'll need to exceed those limits, you might need to add more
subscriptions. If you hit a hard limit maximum, there's no flexibility to increase it.
Management groups are also available to assist with managing subscriptions. A management
group manages access, policies, and compliance across multiple Azure subscriptions. You'll
learn more about management groups later in this module.
Explore compliance terms and requirements
Completed100 XP
5 minutes
In this unit, you learn about the types of compliance offerings that are available on Azure.
As Tailwind Traders moves to running its applications in the cloud, it wants to know how Azure
adheres to applicable regulatory compliance frameworks. The company asks:
How compliant is Azure when it comes to handling personal data?
How compliant are each of Azure's individual services?
Microsoft's online services build upon a common set of regulatory and compliance controls.
Think of a control as a known good standard that you can compare your solution against to
ensure security. These controls address today's regulations and adapt as regulations evolve.
Which compliance categories are available on Azure?
Although there are many more, the following image shows some of the more popular
compliance offerings that are available on Azure. These offerings are grouped under four
categories: Global, US Government, Industry, and Regional.
To get a sense of the variety of the compliance offerings available on Azure, let's take a closer
look at a few of them.
While not all of these compliance offerings will be relevant to you or your team, they show that
Microsoft's commitment to compliance is comprehensive, ongoing, and independently tested
and verified.
Criminal Justice Information Service
Any US state or local agency that wants to access the FBI's Criminal Justice Information Services
(CJIS) database is required to adhere to the CJIS Security Policy.
Azure is the only major cloud provider that contractually commits to conformance with the CJIS
Security Policy. Microsoft adheres to the same requirements that law enforcement and public
safety entities must meet.
Cloud Security Alliance STAR Certification
Azure, Intune, and Microsoft Power BI have obtained Cloud Security Alliance (CSA) STAR
Certification, which involves a rigorous independent third-party assessment of a cloud
provider's security posture.
STAR Certification is based on achieving International Organization of Standards/International
Electrotechnical Commission (ISO/IEC) 27001 certification and meeting criteria specified in the
Cloud Controls Matrix (CCM). This certification demonstrates that a cloud service provider:
Conforms to the applicable requirements of ISO/IEC 27001.
Has addressed issues critical to cloud security as outlined in the CCM.
Has been assessed against the STAR Capability Maturity Model for the management of activities
in CCM control areas.
European Union Model Clauses
Microsoft offers customers European Union (EU) Standard Contractual Clauses that provide
contractual guarantees around transfers of personal data outside of the EU.
Microsoft is the first company to receive joint approval from the EU's Article 29 Working Party
that the contractual privacy protections Azure delivers to its enterprise cloud customers meet
current EU standards for international transfers of data. Meeting this standard ensures that
Azure customers can use Microsoft services to move data freely through Microsoft's cloud,
from Europe to the rest of the world.
Health Insurance Portability and Accountability Act
The Health Insurance Portability and Accountability Act (HIPAA) is a US federal law that
regulates patient Protected Health Information (PHI).
Azure offers customers a HIPAA Business Associate Agreement (BAA), which stipulates
adherence to certain security and privacy provisions in HIPAA and the HITECH Act. To assist
customers in their individual compliance efforts, Microsoft offers a BAA to Azure customers as a
contract addendum.
International Organization of Standards/International Electrotechnical Commission
27018
Microsoft is the first cloud provider to have adopted the ISO/IEC 27018 code of practice, which
covers the processing of personal information by cloud service providers.
Multi-Tier Cloud Security Singapore
After rigorous assessments conducted by the Multi-Tier Cloud Security (MTCS) Certification
Body, Microsoft cloud services received MTCS 584:2013 Certification across all three service
classifications:
Infrastructure as a service (IaaS)
Platform as a service (PaaS)
Software as a service (SaaS)
Microsoft is the first global cloud solution provider to receive this certification across all three
classifications.
Service Organization Controls 1, 2, and 3
Microsoft-covered cloud services are audited at least annually against the Service Organization
Controls (SOC) report framework by independent third-party auditors.
The Microsoft cloud services audit covers controls for data security, availability, processing
integrity, and confidentiality as applicable to in-scope trust principles for each service.
National Institute of Standards and Technology Cybersecurity Framework
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a
voluntary framework that consists of standards, guidelines, and best practices to manage
cybersecurity-related risks.
Microsoft cloud services have undergone independent, third-party Federal Risk and
Authorization Management Program (FedRAMP) Moderate and High Baseline audits. Microsoft
cloud services certified according to the FedRAMP standards.
Additionally, through a validated assessment performed by the Health Information Trust
Alliance (HITRUST), a leading security and privacy standards development and accreditation
organization, Office 365 is certified to the objectives specified in the NIST CSF.
United Kingdom Government G-Cloud
The United Kingdom (UK) Government G-Cloud is a cloud computing certification for services
used by government entities in the United Kingdom. Azure has received official accreditation
from the UK government.
Access the Microsoft Privacy Statement, the Online Services Terms, and the Data Protection Addendum
Completed100 XP
3 minutes
In this part, you learn how the Microsoft Privacy Statement, the Online Services Terms, and the
Data Protection Addendum explain the personal data Microsoft collects, how Microsoft uses it,
and for what purposes.
For Tailwind Traders, understanding Microsoft's commitment to privacy helps ensure that their
customer and application data will be protected.
Watch the following video to see an overview on how Microsoft runs on trust.
Let's continue with a brief look at the Microsoft Privacy Statement and where to find it.
What's in the Microsoft Privacy Statement?
The Microsoft Privacy Statement explains what personal data Microsoft collects, how Microsoft
uses it, and for what purposes.
The privacy statement covers all of Microsoft's services, websites, apps, software, servers, and
devices. This list ranges from enterprise and server products to devices that you use in your
home to software that students use at school.
Microsoft's privacy statement also provides information that's relevant to specific products
such as Windows and Xbox.
What's in the Online Services Terms?
The Online Services Terms (OST) is a legal agreement between Microsoft and the customer. The
OST details the obligations by both parties with respect to the processing and security of
customer data and personal data. The OST applies specifically to Microsoft's online services that
you license through a subscription, including Azure, Dynamics 365, Office 365, and Bing Maps.
What is the Data Protection Addendum?
The Data Protection Addendum (DPA) further defines the data processing and security terms
for online services. These terms include:
Compliance with laws.
Disclosure of processed data.
Data Security, which includes security practices and policies, data encryption, data access,
customer responsibilities, and compliance with auditing.
Data transfer, retention, and deletion.
To access the DPA:
Go to the Licensing Terms and Documentation.
In the search bar, enter DPA.
From the search results, locate the link to the DPA in your preferred language. Alternatively, in
the search bar that appears, enter your preferred language to filter the results. Here's an
example that retrieves the English version of the DPA.
Transparency is important when it comes to how a cloud provider communicates its privacy
policies and how it treats your data. The Microsoft Privacy Statement, the OST, and the DPA
detail Microsoft's commitment to protecting data and privacy in the cloud.
Explore the Trust Center
Completed100 XP
3 minutes
Tailwind Traders needs to stay up to date on the latest security standards for protecting its
data. Today, the security team needs to verify whether Azure meets ISO 27001, a commonly
used information security standard. Where can the company access this information?
The Trust Center showcases Microsoft's principles for maintaining data integrity in the cloud
and how Microsoft implements and supports security, privacy, compliance, and transparency in
all Microsoft cloud products and services. The Trust Center is an important part of the Microsoft
Trusted Cloud Initiative and provides support and resources for the legal and compliance
community.
Under the Regulatory & industry compliance section, click Microsoft compliance offerings.
You're taken to Microsoft compliance offerings.
The offerings are grouped into four categories: Global, US Government, Industry, and Regional.
Under Global, select ISO 27001.
The ISO 27001 Information Security Management Standards page is typical of the type of
compliance information we provide.
Briefly review the documentation for ISO/IEC 27001.
You see:
An overview of the standard.
Which cloud services are in scope.
An overview of the audit cycle and links to audit reports.
Answers to frequently asked questions.
Additional resources and white papers.
The areas of documentation for other compliance offerings will vary, but this format is the
typical one that you'll find.
Access Azure compliance documentation
Completed100 XP
4 minutes
Here, you learn how to access detailed documentation about legal and regulatory standards
and compliance on Azure.
E-commerce is an important part of Tailwind Traders' sales strategy. Its online retail
store enables customers to easily browse and order products. Customers typically pay by credit
card, so Tailwind Traders has a responsibility under the Payment Card Industry (PCI) Data
Security Standard (DSS). This global standard, known as PCI DSS, seeks to prevent fraud through
increased control of credit card data. The standard applies to any organization that stores,
processes, or transmits payment and cardholder data.
You've been tasked with investigating whether hosting the company's e-commerce application
on Azure would be compliant with PCI DSS. You start with the Azure compliance
documentation.
What is the Azure compliance documentation?
The Azure compliance documentation provides you with detailed documentation about legal
and regulatory standards and compliance on Azure.
Here you find compliance offerings across these categories:
Global
US government
Financial services
Health
Media and manufacturing
Regional
There are also additional compliance resources, such as audit reports, privacy information,
compliance implementations and mappings, and white papers and analyst reports. Country and
region privacy and compliance guidelines are also included. Some resources might require you
to be signed in to your cloud service to access them.
Examine PCI DSS compliance
The legal team at Tailwind Traders wants to learn more about how PCI DSS relates to the
company's e-commerce application on Azure.
As an optional exercise, here you follow along.
Go to the Azure compliance documentation.
Under Financial services, select PCI DSS.
There you see:
An overview of the PCI DSS standard.
How PCI DSS applies to Microsoft.
Which cloud services are in scope.
An overview of the audit cycle.
Answers to frequently asked questions.
Additional resources and white papers.
Access additional compliance resources
From the Azure compliance documentation, you can access additional compliance resources.
For example, from the Audit reports section, you find a link to audit reports for PCI DSS.
From there, you can access several different files, including the Attestation of Compliance
reports and the PCI DSS Shared Responsibility Matrix.
Under Compliance blueprints, you find reference blueprints, or policy definitions, for common
standards that you can apply to your Azure subscription. The PCI DSS blueprint deploys a core
set of policies that map to PCI DSS compliance and help you govern your Azure workloads
against this standard.
You can then see if the Azure resources in your application architecture have been configured
correctly for PCI DSS compliance, or which resources you need to remediate.
Because standards evolve, the Tailwind Traders team might check the audit report periodically
to ensure that Azure has any recent changes.
What is Azure Government?
Completed100 XP
2 minutes
Azure Government is a separate instance of the Microsoft Azure service. It addresses the
security and compliance needs of US federal agencies, state and local governments, and their
solution providers. Azure Government offers physical isolation from non-US government
deployments and provides screened US personnel.
Azure Government services handle data that is subject to certain government regulations and
requirements:
Federal Risk and Authorization Management Program (FedRAMP)
National Institute of Standards and Technology (NIST) 800.171 Defense Industrial Base (DIB)
International Traffic in Arms Regulations (ITAR)
Internal Revenue Service (IRS) 1075
Department of Defense (DoD) L4
Criminal Justice Information Service (CJIS)
To provide the highest level of security and compliance, Azure Government uses physically
isolated datacenters and networks located only in the US. Azure Government customers, such
as the US federal, state, and local government or their partners, are subject to validation of
eligibility.
Azure Government provides the broadest compliance and Level 5 DoD approval. Azure
Government is available in eight geographies and offers the most compliance certifications of
any cloud provider.
What is Azure China 21Vianet?
Completed100 XP
2 minutes
Azure China 21Vianet is operated by 21Vianet. It's a physically separated instance of cloud
services located in China. Azure China 21Vianet is independently operated and transacted by
Shanghai Blue Cloud Technology Co., Ltd. ("21Vianet"), a wholly owned subsidiary of Beijing
21Vianet Broadband Data Center Co., Ltd.
According to the China Telecommunication Regulation, providers of cloud services,
infrastructure as a service (IaaS) and platform as a service (PaaS), must have value-added
telecom permits. Only locally registered companies with less than 50 percent foreign
investment qualify for these permits. To comply with this regulation, the Azure service in China
is operated by 21Vianet, based on the technologies licensed from Microsoft.
As the first foreign public cloud service provider offered in China in compliance with
government regulations, Azure China 21Vianet provides world-class security as discussed on
the Trust Center, as required by Chinese regulations for all systems and applications built on its
architecture.
Azure products and services available in China
The Azure services are based on the same Azure, Office 365, and Power BI technologies that
make up the Microsoft global cloud service, with comparable service levels. Azure agreements
and contracts in China, where applicable, are signed between customers and 21Vianet.
Azure includes the core components of IaaS, PaaS, and software as a service (SaaS). These
components include network, storage, data management, identity management, and many
other services.
Azure China 21Vianet supports most of the same services that global Azure has, such as
geosynchronous data replication and autoscaling. Even if you already use global Azure services,
to operate in China you might need to rehost or refactor some or all your applications or
services.
Compare costs by using the Total Cost of Ownership Calculator
Completed100 XP
5 minutes
Before Tailwind Traders takes its next steps toward migrating to the cloud, it wants to better
understand what it spends today in its datacenter.
Having a firm understanding of where the company is today will give it a greater sense of what
cloud migration means in terms of cost.
In this unit, you'll see how the Total Cost of Ownership (TCO) Calculator can help you compare
the cost of running in the datacenter versus running on Azure.
What's the TCO Calculator?
The TCO Calculator helps you estimate the cost savings of operating your solution on Azure
over time compared to operating in your on-premises datacenter.
The term total cost of ownership is used commonly in finance. It can be hard to see all the
hidden costs related to operating a technology capability on-premises. Software licenses and
hardware are additional costs.
With the TCO Calculator, you'll enter the details of your on-premises workloads. Then you can
review the suggested industry-average cost (which you can adjust) for related operational
costs. These costs include electricity, network maintenance, and IT labor. You're then presented
with a side-by-side report. Using the report, you can compare those costs with the same
workloads running on Azure.
The following image shows one example:
Note
You don't need an Azure subscription to work with the TCO Calculator.
How does the TCO Calculator work?
Working with the TCO Calculator involves three steps:
Define your workloads
Adjust assumptions
View the report
For each category (compute, datacenter, networking, storage, and IT labor), you can also view a
side-by-side comparison of the cost breakdown of operating those workloads on-premises
versus operating them on Azure. Here's an example:
Let's see how Tailwind Traders' existing workloads compare in the datacenter versus on Azure.
Define your workloads
Enter the specifications of your on-premises infrastructure into the TCO Calculator.
Go to the TCO Calculator.
Under Define your workloads, select Add server workload to create a row for your bank of
Windows Server VMs.
Under Servers, set the value for each of these settings:
Setting Value
Name Servers: Windows VMs
Workload Windows/Linux Server
Environment Virtual Machines
Operating system Windows
VMs 50
Virtualization Hyper-V
Core(s) 8
RAM (GB) 16
Optimize by CPU
Windows Server 2008/2008 R2 Off
Select Add server workload to create a second row for your bank of Linux VMs. Then specify
these settings:
Setting Value
Name Servers: Linux VMs
Workload Windows/Linux Server
Environment Virtual Machines
Operating system Linux
VMs 50
Virtualization VMware
Core(s) 8
RAM (GB) 16
Optimize by CPU
Under Storage, select Add storage. Then specify these settings:
Setting Value
Name Server Storage
Storage type Local Disk/SAN
Disk type HDD
Capacity 60 TB
Backup 120 TB
Archive 0 TB
Under Networking, set Outbound bandwidth to 15 TB.
Select Next.
Adjust assumptions
Here, you'll specify your currency. For brevity, you can leave the remaining fields at their
default values.
In practice, you would adjust any cost assumptions and make any adjustments to match your
current on-premises environment.
At the top of the page, select your currency. This example uses US Dollar ($).
Select Next.
View the report
Take a moment to review the generated report.
Remember, you've been tasked to investigate cost savings for your European datacenter over
the next three years.
To make these adjustments:
Set Timeframe to 3 Years.
Set Region to North Europe.
Scroll to the summary at the bottom. You'll see a comparison of running your workloads in the
datacenter versus on Azure. The prices you see might differ, but here's an example of the cost
savings you might expect.
At the end of each month, you're billed for what you've used. At any time, you can check the
Cost Management + Billing page in the Azure portal to get a summary of your current usage and
review invoices from prior months.
What factors affect cost?
The way you use resources, your subscription type, and pricing from third-party vendors are
common factors. Let's take a quick look at each.
Resource type
A number of factors influence the cost of Azure resources. They depend on the type of resource
or how you customize it.
For example: with a storage account, you'll specify a type (such as block blob storage or table
storage), a performance tier (standard or premium), and an access tier (hot, cool, or archive).
These selections present different costs.
Usage meters
When you provision a resource, Azure creates meters to track that resource's usage. Azure uses
these meters to generate a usage record that's later used to help calculate your bill.
Think of usage meters as similar to how you use electricity or water in your home. You might
pay a base price each month for electricity or water service, but your final bill is based on the
total amount that you consumed.
Let's look at a single VM as an example. The following kinds of meters are relevant to tracking
its usage:
Overall CPU time
Time spent with a public IP address
Incoming (ingress) and outgoing (egress) network traffic in and out of the VM
Disk size and amount of disk read and disk write operations
Each meter tracks a specific type of usage. For example, a meter might track bandwidth usage
(ingress or egress network traffic in bits per second), number of operations, or its size (storage
capacity in bytes).
The usage that a meter tracks correlates to a quantity of billable units. Those units are charged
to your account for each billing period. The rate per billable unit depends on the resource type
you're using.
Resource usage
In Azure, you're always charged based on what you use. As an example, let's look at how this
billing applies to deallocating a VM.
In Azure, you can delete or deallocate a VM. Deleting a VM means that you no longer need it.
The VM is removed from your subscription, then it's prepared for another customer.
Deallocating a VM means that the VM is no longer running, but the associated hard disks and
data are still kept in Azure. The VM isn't assigned to a CPU or network in Azure's datacenter, so
it doesn't generate the costs associated with compute time or the VM's IP address. Because the
disks and data are still stored, and the resource is present in your Azure subscription, you're still
billed for disk storage.
Deallocating a VM when you don't plan on using it for some time is just one way to minimize
costs. For example, you might deallocate the VMs you use for testing purposes on weekends
when your testing team isn't using them. You'll learn more about ways to minimize cost later in
this module.
Azure subscription types
Some Azure subscription types also include usage allowances, which affect costs.
For example, an Azure free trial subscription provides access to a number of Azure products
that are free for 12 months. It also includes credit to spend within your first 30 days of sign-up.
You also get access to more than 25 products that are always free (based on resource and
region availability).
Azure Marketplace
You can also purchase Azure-based solutions and services from third-party vendors through
Azure Marketplace. Examples include managed network firewall appliances or connectors to
third-party backup services. Billing structures are set by the vendor.
Does location or network traffic affect cost?
When you provision a resource in Azure, you need to define the location (known as the Azure
region) of where it will be deployed. Let's see why this decision can have cost consequences.
Location
Azure infrastructure is distributed globally, which lets you deploy your services centrally or
provision your services closest to where your customers use them.
Different regions can have different associated prices. Because geographic regions can affect
where your network traffic flows, network traffic is a cost influence to consider as well.
For example, say Tailwind Traders decides to provision its Azure resources in the Azure regions
that offer the lowest prices. That decision would save the company some money. However, if
they need to transfer data between those regions, or if their users are located in different parts
of the world, any potential savings could be offset by the additional network-usage costs of
transferring data between those resources.
Zones for billing of network traffic
Billing zones are a factor in determining the cost of some Azure services.
Bandwidth refers to data moving in and out of Azure datacenters. Some inbound data transfers
(data going into Azure datacenters) are free. For outbound data transfers (data leaving Azure
datacenters), data transfer pricing is based on zones.
A zone is a geographical grouping of Azure regions for billing purposes. The following zones
include some of the regions as shown here:
Zone 1: Australia Central, West US, East US, Canada West, West Europe, France Central, and
others
Zone 2: Australia East, Japan West, Central India, Korea South, and others
Zone 3: Brazil South, South Africa North, South Africa West, UAE Central, UAE North
DE Zone 1: Germany Central, Germany Northeast
How can I estimate the total cost?
As you've learned, an accurate cost estimate takes all of the preceding factors into account.
Fortunately, the Azure Pricing calculator helps you with that process.
The Pricing calculator displays Azure products in categories. You can add these categories to
your estimate and configure according to your specific requirements. You'll then receive a
consolidated estimated price, with a detailed breakdown of the costs associated with each
resource you added to your solution. You can export or share that estimate or save it for later.
You can load a saved estimate and modify it to match updated requirements.
You also can access pricing details, product details, and documentation for each product from
within the Pricing calculator.
The options you can configure in the Pricing calculator vary between products, but can include:
Region
A region is the geographical location in which you can provision a service. Southeast Asia,
Central Canada, Western United States, and Northern Europe are a few examples.
Tier
Tiers, such as the Free tier or Basic tier, have different levels of availability or performance and
different associated costs.
Billing options
Billing options highlight the different ways you can pay for a service. Options can vary based on
your customer type and subscription type, and can include options to save costs.
Support options
These options let you select additional support pricing options for certain services.
Programs and offers
Your customer or subscription type might allow you to choose from specific licensing programs
or other offers.
Azure Dev/Test pricing
This option lists the available prices for development and test workloads. Dev/Test pricing
applies when you run resources within an Azure subscription that's based on a Dev/Test offer.
Keep in mind that the Pricing calculator provides estimates and not actual price quotes. Actual
prices can vary depending upon the date of purchase, the payment currency you're using, and
the type of Azure customer you are.
Exercise - Estimate workload cost by using the Pricing calculator
Completed100 XP
6 minutes
In this exercise, you'll use the Pricing calculator to estimate the cost of running a basic web
application on Azure.
With an understanding of the more important cost factors associated with running on Azure,
Tailwind Traders wants to take a typical workload and estimate how much it would cost each
month to run it on Azure.
The IT Manager at Tailwind Traders is faced with the decision about whether to replace some
aging on-premises hardware or move the application to Azure. The company needs to know
how much the ongoing monthly cost of the solution in Azure would be.
Let's start by defining which Azure services you need.
Note
The Pricing calculator is for information purposes only. The prices are only an estimate, and you
won't be charged for any services you select.
Define your requirements
Before you run the Pricing calculator, you first need a sense of what Azure services you need.
You've met with the application development team to discuss their migration project. In their
datacenter, the team has an ASP.NET web application that runs on Windows. The web
application provides information about product inventory and pricing. They have two virtual
machines that are connected through a central load balancer. The web application connects to
a SQL Server database that holds inventory and pricing information.
The team decides to:
Use Azure Virtual Machines instances, similar to the virtual machines they use in the datacenter
Use Azure Application Gateway for load balancing
Use Azure SQL Database to hold inventory and pricing information
Here's a diagram that shows the basic configuration:
In practice, you would define your requirements in greater detail. But here are some basic facts
and requirements that came up during the meeting:
Tailwind Traders employees use the application at their retail stores. It's not accessible to
customers.
This application doesn't require a massive amount of computing power.
The virtual machines and the database run all the time (730 hours per month).
The network processes about 1 TB of data per month.
The database doesn't need to be configured for high-performance workloads and requires no
more than 32 GB of storage.
Explore the Pricing calculator
Let's start with a quick tour of the Pricing calculator.
Go to the Pricing calculator.
Notice the following tabs:
Products
This is where you can choose the Azure services that you want to include in your estimate.
You'll likely spend most of your time here.
Example Scenarios
Here you'll find several reference architectures, or common cloud-based solutions that you can
use as a starting point.
Saved Estimates
Here you'll find your previously saved estimates.
FAQ
Here you'll discover answers to frequently asked questions about the Pricing calculator.
Estimate your solution
Here you'll add each Azure service that you need to the calculator. Then you configure each
service to fit your needs.
Tip
Make sure you have a clean calculator with nothing listed in the estimate. You can reset the
estimate by selecting the trash can icon next to each item.
Add services to the estimate
On the Products tab, select the service from each of these categories:
Category Service
Compute Virtual Machines
Databases Azure SQL Database
Networking Application Gateway
Scroll to the bottom of the page. You'll see that each service is listed with its default
configuration.
Recommendations are sorted by impact: high, medium, or low. In some cases, Azure Advisor
can automatically remediate, or fix, the underlying problem. Other issues, such as the two that
are listed as high impact, require human intervention.
Use spending limits to restrict your spending
If you have a free trial or a credit-based Azure subscription, you can use spending limits to
prevent accidental overrun.
For example, when you spend all the credit included with your Azure free account, Azure
resources that you deployed are removed from production and your Azure virtual machines
(VMs) are stopped and deallocated. The data in your storage accounts is available as read-only.
At this point, you can upgrade your free trial subscription to a pay-as-you-go subscription.
If you have a credit-based subscription and you reach your configured spending limit, Azure
suspends your subscription until a new billing period begins.
A related concept is quotas, or limits on the number of similar resources you can provision
within your subscription. For example, you can allocate up to 25,000 VMs per region. These
limits mainly help Microsoft plan its datacenter capacity.
Use Azure Reservations to prepay
Azure Reservations offers discounted prices on certain Azure services. Azure Reservations can
save you up to 72 percent as compared to pay-as-you-go prices. To receive a discount, you can
reserve services and resources by paying in advance.
For example, you can prepay for one year or three years of use of VMs, database compute
capacity, database throughput, and other Azure resources.
The following example shows estimated savings on VMs. In this example, you save an estimated
72 percent by committing to a three-year term.
Azure Reservations are available to customers with an Enterprise Agreement, Cloud Solution
Providers, and pay-as-you-go subscriptions.
Choose low-cost locations and regions
The cost of Azure products, services, and resources can vary across locations and regions. If
possible, you should use them in those locations and regions where they cost less.
But remember, some resources are metered and billed according to how much outgoing
(egress) network bandwidth they consume. You should provision connected resources that are
metered by bandwidth in the same Azure region to reduce egress traffic between them.
Research available cost-saving offers
Keep up to date with the latest Azure customer and subscription offers, and switch to offers
that provide the greatest cost-saving benefit.
Use Microsoft Cost Management + Billing to control spending
Cost Management is a free service that helps you understand your Azure bill, manage your
account and subscriptions, monitor and control Azure spending, and optimize resource use.
The following image shows current usage broken down by service:
In this example, Azure App Service, a web application hosting service, generates the greatest
cost.
Cost Management features include:
Reporting
Use historical data to generate reports and forecast future usage and expenditure.
Data enrichment
Improve accountability by categorizing resources with tags that correspond to real-world
business and organizational units.
Budgets
Create and manage cost and usage budgets by monitoring resource demand trends,
consumption rates, and cost patterns.
Alerting
Get alerts based on your cost and usage budgets.
Recommendations
Receive recommendations to eliminate idle resources and to optimize the Azure resources you
provision.
Apply tags to identify cost owners
Tags help you manage costs associated with the different groups of Azure products and
resources. You can apply tags to groups of Azure resources to organize billing data.
For example, if you run several VMs for different teams, you can use tags to categorize costs by
department, such as Human Resources, Marketing, or Finance; or by environment, such as Test
or Production.
Tags make it easier to identify groups that generate the biggest Azure costs, which can help you
adjust your spending accordingly.
The following image shows a year's worth of usage broken down by tags on the Cost
Management page:
Keep in mind that resizing a VM requires it to be stopped, resized, and then restarted. This
process might take a few minutes depending on how significant the size change is. Be sure to
properly plan for an outage, or shift your traffic to another instance while you perform resize
operations.
Deallocate virtual machines during off hours
Recall that to deallocate a VM means to no longer run the VM, but preserve the associated hard
disks and data in Azure.
If you have VM workloads that are only used during certain periods, but you're running them
every hour of every day, you're wasting money. These VMs are great candidates to shut down
when not in use and start back when you need them, saving you compute costs while the VM is
deallocated.
This approach is an excellent strategy for development and testing environments, where the
VMs are needed only during business hours. Azure even provides a way to automatically start
and stop your VMs on a schedule.
Delete unused resources
This recommendation might sound obvious, but if you aren't using a resource, you should shut
it down. It's not uncommon to find nonproduction or proof-of-concept systems that are no
longer needed following the completion of a project.
Regularly review your environment, and work to identify these systems. Shutting down these
systems can have a dual benefit by saving you on infrastructure costs and potential savings on
licensing and operating costs.
Migrate from IaaS to PaaS services
As you move your workloads to the cloud, a natural evolution is to start with infrastructure as a
service (IaaS) services, because they map more directly to concepts and operations you're
already familiar with.
Over time, one way to reduce costs is to gradually move IaaS workloads to run on platform as a
service (PaaS) services. While you can think of IaaS as direct access to compute infrastructure,
PaaS provides ready-made development and deployment environments that are managed for
you.
As an example, say you run SQL Server on a VM running on Azure. This configuration requires
you to manage the underlying operating system, set up a SQL Server license, manage software
and security updates, and so on. You also pay for the VM whether or not the database is
processing queries. One way to potentially save costs is to move your database from SQL Server
on a VM to Azure SQL Database. Azure SQL Database is based on SQL Server.
Not only are PaaS services such as Azure SQL Database often less expensive to run, but because
they're managed for you, you don't need to worry about software updates, security patches, or
optimizing physical storage for read and write operations.
Save on licensing costs
Licensing is another area that can dramatically affect your cloud spending. Let's look at some
ways you can reduce your licensing costs.
Choose cost-effective operating systems
Many Azure services provide a choice of running on Windows or Linux. In some cases, the cost
depends on which you choose. When you have a choice, and your application doesn't depend
on the underlying operating system, it's useful to compare pricing to see whether you can save
money.
Use Azure Hybrid Benefit to repurpose software licenses on Azure
If you've purchased licenses for Windows Server or SQL Server, and your licenses are covered
by Software Assurance, you might be able to repurpose those licenses on VMs on Azure.
Some of the details vary between Windows Server or SQL Server. We'll provide resources for
you to learn more at the end of this module.
What are service-level agreements (SLAs)?
Completed100 XP
6 minutes
As mentioned in the video, a service-level agreement (SLA) is a formal agreement between a
service company and the customer. For Azure, this agreement defines the performance
standards that Microsoft commits to for you, the customer.
In this part, you'll learn more about Azure SLAs, including why SLAs are important, where you
can find the SLA for a specific Azure service, and what you'll find in a typical SLA.
Why are SLAs important?
Understanding the SLA for each Azure service you use helps you understand what guarantees
you can expect.
When you build applications on Azure, the availability of the services that you use affect your
application's performance. Understanding the SLAs involved can help you establish the SLA you
set with your customers.
Later in this module, you'll learn about some strategies you can use when an Azure SLA doesn't
meet your needs.
Where can I access SLAs for Azure services?
You can access SLAs from Service Level Agreements.
Note
You don't need an Azure subscription to review service SLAs.
Each Azure service defines its own SLA. Azure services are organized by category.
Open the SLA for Azure Database for MySQL, a managed database that makes it easy for
developers to work with MySQL databases. You'll refer back to this SLA in a moment.
To do so:
Go to Service Level Agreements.
From the Databases category, select Azure Database for MySQL.
development.
Browse updates by product category or update type.
Search for updates by keyword.
Subscribe to an RSS feed to receive notifications.
Access the Microsoft Connect page to read Azure product news and announcements.