So while we all think we’re are in groundhog day from lockdown, its important to find ways to get out of the house. So the big one we’ve been doing is on weekends, every week my wife and I have been taking on a “culinary experiment” involving the smoker. Here’s the model I’ve got a Weber Smokey Mountain.
So given that we are all in lockdown, I’ve been making my way through netflix like everyone else. Finally about halfway through Altered Carbon season 2, and I have to say I’m really enjoying it so far. Anthony Mackie does a great job as Tak, and Poe’s story arc really is fantastic. A stellar second season for this series.
Now here’s a fun topic I wanted to share, as I’ve been looking more and more into this. When many people think of the cloud, in my experience the ideas of networking and security are what has changed so vastly compared to what they think of in a normal circumstance.
At its core, there is a mindset shift between the way on-prem data centers, and cloud based networking function. And its important to remember these fundamental differences or else you run into a variety of problems down the road. It’s easy to get overwhelmed to be honest, and I don’t mean for this to seem complete by any stretch of the imagination. But you have to start somewhere right.
The most important thing to remember is that some elements of security just don’t apply anymore, at least not in the traditional sense. And here are some of those concepts:
Perimeter Security is not what it used to be: This is the hardest thing for a lot of people to realize, but everyone still tries to cling to these notions that the only way to secure a workload is through locking down every public endpoint, and build a perimeter around your application, and then call it a day. Do a search online of the number of companies who implement perimeter security practices and how many times it blew up in their face. Security Threats, attack vectors are always changing and to consider the idea that you can build a fence and that’s good enough is just ridiculious.
Authentication / Authorization are the new IP address: Another situation that I see all too common with the cloud is people clinging to IP whitelisting. IP Whitelisting is not sufficient for many of the more sophisticated attackers any more. And to be honest, your preventing yourself from taking advantage of cloud based services that are more secure than what you are capable of implementing yourself. The idea of Zero trust has been growing more and more, and here we assume that no sending is safe, without credentials. This ensures better security overall.
So what do we have to look at to start. I wanted to provide some ideas of potential areas to focus when it came to security for the Cloud and those options are here.
Here is a quickly consumable “Best Practices” for IaaS workloads for security.
Additionally there is a link to security documentation for azure, and this provides a lot of details on different topics and questions.
Network / Application Security Groups: NSGs are a great way of limiting the traffic within a virtual network. But additionally in this space, we provide service tags, which allows you to manage the different azure services you might allow to communicate for rule creation. Things like “AzureTrafficManager”, “VirtualNetwork”, “Sql”, “Storage”. Additionally there is an option with Application Security Groups (ASGs), which enable you to configure the NSGs to be based on the application architecture.
Virtual Network Service Endpoints: This provides an option to extend your virtual network private address space to Azure services without traveling the public internet. So the intention here would be, I want my machines to access “KeyVault”, but I don’t want it to be accessible outside of the vNet. This is important as it allows you to further lock down your networking and access.
Virtual Network Peering: As you identified in your network diagram, you were implementing two virtual networks. If you want communication to occur across the different virtual networks, you would need to implement vnet peering to enable that traffic.
Ultimately as I mentioned above, Zero Trust security models are really the direction of the future from a Cyber Security direction. A great site that covers the idea of Zero trust, and all the considerations can be found here. As well as a great whitepaper here.
I’ve made no secret of my Fandom attached to dungeons and dragons and recently the opening cinematic for baldurs gate 3 dropped and it is amazing. It can be found here.
Manage Cookie Consent
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.