33
How to Protect Identities and Secure Your Azure Environment Adnan Hendricks Cloud Solutions Architect Microsoft MVP @Microspecialist Mason Takacs Systems Engineer Netwrix

How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

How to Protect Identities and Secure Your Azure Environment

Adnan HendricksCloud Solutions Architect Microsoft MVP @Microspecialist

Mason TakacsSystems EngineerNetwrix

Page 2: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Agenda

• Azure AD Identity Governance

• Azure AD Identity Protection

• Azure Security Center

• Why Native Tools are not Enough

• Netwrix Auditor Solutions

• Q&A Session

• Prize Drawing

Page 3: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

• Govern Identity lifecycle• Govern Access lifecycle• Secure Administration

Identity Governance

Page 4: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Identity Governance

• Who has / should have accessto which resources?

• What are they doingwith that access?

• Are there effective organizational controls for managing access?

• Can auditors verify thatthe controls are working?

Productivity

Security

Timely access to the right resources

The right people have the right access to resources

Page 5: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Identity Protection• Detect Vulnerabilities• Configure automated responses• Detect suspicious incidents

Page 6: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Protection Options

Password

protection

Smart Lockout Configure MFA

Password-less

Phone sign in

Conditional Access Identity Protection

policies

Page 7: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Azure Security Center• Unified security management• Apply security policies• Detect & respond to threats• Limit exposure to threats

Page 8: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Demonstration

Azure AD Security

Page 9: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 10: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 11: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 12: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 13: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 14: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 15: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 16: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 17: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 18: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 19: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security
Page 20: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Netwrix AuditorVisibility platform for user behavior analysis

and risk mitigation

Page 21: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

About Netwrix Auditor

A visibility platform for user behavior analysis and risk mitigation

that enables control over changes, configurations, and access in hybrid IT environments.

It provides security intelligence to identify security holes, detect anomalies in user behavior

and investigate threat patterns in time to prevent real damage.

Netwrix Auditor

Page 22: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Netwrix Auditor Benefits

Detect Data Security Threats, Both on Premises

and in the Cloud

• Identify and assess security risks

• Discover unprotected sensitive data

• Detect privilege abuse and escalation

• Spot malicious insider activity

• Investigate behavior anomalies

• Receive alerts on threat patterns

Pass Compliance Audits with Less Effort and

Expense

• Prove that controls are in place

• Validate security policies

• Effectively prepare for audits

• Answer auditors’ questions faster

• Drive compliance costs down

• Maintain complete audit trail

• Control changes to key systems

• Streamline team collaboration

• Simplify reporting to leadership

• Troubleshoot user issues faster

• Minimize system downtime

• Support IT workflows

Increase the Productivity of IT Security and Operations Teams

Page 23: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Netwrix Auditor Unified Platform

Netwrix Auditor for

Active Directory

Netwrix Auditor for

Windows File Servers

Netwrix Auditor for

Oracle Database

Netwrix Auditor for

Azure AD

Netwrix Auditor for

EMC

Netwrix Auditor for

SQL Server

Netwrix Auditor for

Exchange

Netwrix Auditor for

NetApp

Netwrix Auditor for

Windows Server

Netwrix Auditor for

Office 365Netwrix Auditor for

SharePoint

Netwrix Auditor for

VMware

Netwrix Auditor for

Network Devices

Add-on for

Amazon Web Services

Add-on for

Generic Linux Syslog

Add-on for

Splunk

Add-on for

ServiceNow ITSM

Add-on for

IBM QRadar

Infrastructure Unstructured Data Structured Data Cloud Free Add-ons

Deployment Options

On-premises

Deployment

Virtual

Appliance

Cloud

Deployment

Data Discovery & Classification

Page 24: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Netwrix Auditor for Azure AD

• Changes to Azure AD groups, users, passwords,

roles, applications, service principals, devices,

contacts, and more

• Logon auditing

Netwrix Auditor for

Active Directory

Netwrix Auditor for

Windows File Servers

Netwrix Auditor for

Oracle Database

Netwrix Auditor for

Azure AD

Netwrix Auditor for

EMC

Netwrix Auditor for

SQL Server

Netwrix Auditor for

Exchange

Netwrix Auditor for

NetApp

Netwrix Auditor for

Windows ServerNetwrix Auditor for

Office 365

Netwrix Auditor for

SharePoint

Netwrix Auditor for

VMware

Netwrix Auditor for

Network Devices

Page 25: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Demonstration

Netwrix Auditor

Page 26: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Spot threat patterns

Page 27: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Investigate security incidents

Page 28: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Troubleshoot unauthorized changes

Page 29: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Simplify preparation for compliance audits

Page 30: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Useful Links

Free trial: Set up Netwrix Auditor in your own test environment netwrix.com/auditor9.7

Virtual appliance: Get Netwrix Auditor up and running in minutes netwrix.com/go/appliance

In-browser demo: Run a demo right in your browser with no need to install anything

netwrix.com/go/browser_demo

Contact Sales to obtain more information: netwrix.com/contactsales

If you want to learn more about Netwrix Auditor, register now for the upcoming product demo on Dec 18!

Page 31: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Questions?

Page 32: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Prize Drawing

Page 33: How to Protect Identities and Secure Your Azure Environment · Identity Governance. Identity Governance • Who has / should have access to which resources? ... It provides security

Thank you!