Who should Read it?
If you are thinking of using Windows Cloud Services and have doubts regarding your data security, privacy, threats, network security, etc. then this article is for you. And if not, then I’ll say just read it to understand cloud security features, as it will take nothing and give you some knowledge.
So let’s take a look at some important points that I am going to discuss in it.
- Identity and Access
- Network Security
- Data Privacy
- Data Protection
- Threat Defence
Identity and Access
If you are going to use Microsoft Azure cloud services then you don’t need to think much about threats related to Identity and Access because Azure provides you enterprise-level cloud identity governance that enables you to manage access for your users.
This graphic explains it all.
Let’s take a quick look at the important points of this feature.
- Sync existing identities.
- Single Sign to Azure and Office 365 and the entire world of other cloud-based services and applications.
- It monitors access patterns in order to identify and lessen potential cloud threats.
- It helps in preventing Unauthorized access by using its Advance Azure Multi-Factor Authentication System.
- It also empowers users with self-service Identity Management Capabilities.
Network Security
Now coming to this next point. Network Security is another most important thing whenever we talk about cloud or other services. When you will be using Azure services your Azure Virtual Machine and data both are isolated from these factors.
- Undesirable Traffic
- Users
- Potential Threats etc.
But in case you still want a connection with them you can do that easily but through a different approach without creating any harm to your security. This approach is via – “Encrypted or Private Connections”.
This graphic explains it all.
Let’s take a quick look at the bullets of this feature.
- Benefit from FIREWALLED and PARTITIONED NETWORKS to help protect against unwanted traffic from the Internet.
- You can always manage your Virtual Machine with Encrypted Remote Desktop and Windows Powershell Sessions.
- Securely connect to your on-premises data center or a single commuter using an Azure Virtual Network.
- Keep your traffic off the Internet by using Azure Express Route services. (It is like a private fiber that directly links you to Azure.).
Data Privacy
We are switching and increasing the use of the Cloud and related services to somehow deal with data in an easy and better fashion, but what if the reason that making you use the cloud tends you to some critical damage?
I’ll say- “Don’t Worry!”
Because if you are going to use Azure cloud Services you don’t need to think about it, and I mean it. Microsoft is committed to safeguarding the privacy and security of your data. You have always the power to choose where your data will reside and who gonna see and access it. You can always do that as per your choice.
This graphic explains it all.
Let’s take a quick look at the bullets of this feature.
- It specifies the Geographic location of areas where your data is.
- You can also use a replica of that data in that Geographic location for that Redundancy, an extra step to make your data secure, I would say.
- Microsoft also provides additional contractual commitments about the transfer of the data addressing the E.U. Data Protection Directive.
- It also limits Microsoft to access and use your data (What else you wish for).
- Microsoft never uses its customer data for advertising purposes under certain policies of data privacy.
Data Protection
Data Privacy and Data Protection are important measures when it comes to your Data and trust me Microsoft understands this, that’s why Microsoft is highly concerned about Azure Data protection and makes it a priority when it comes to services.
Several technical safeguards and measures like.
- Encryption
- Operational Processes
- Data Protection Policies
Are used for making your data only yours.
Let’s take a quick look at the bullets of this feature.
- Microsoft uses Encryption in order to help secure data in transit data centers and you, the customer.
- You always have several options to customize your Encryption Standard.
- In order to customize encryption Microsoft provides lots of approaches- you can control the approaches and the related keys.
- In case you leave Azure or delete your data, Microsoft follows strict standards and rules that call for overwriting storage resources before the reuse.
Threat Defense
Every day we hear about some new emerging threats and some old threats too and how they did harm to someone’s data. Thus, in order to defend from unknown and emerging threats requires constant vigilance and a set of defenses in place and Microsoft is a master in it.
Microsoft uses its continuous, constant vigilance and an array of defenses against several types of know-unknown and emerging threats.
Let’s take a quick look at the bullets of this feature.
- An integrated development system manages security updates for the software.
- You can also apply the Security Update Management Program to your virtual machine for an extra layer of security.
- Continuous monitoring and analysis of the traffic reveals all the anomalies and potential threats.
- Microsoft also uses some Forensic Tools to provide better security against threats and spacious ads.
I hope you guys will like it. Keep Sharing! Keep Tweaking!