Welcome!

Related Topics: Microsoft Cloud, @CloudExpo, Cloud Security

Microsoft Cloud: Blog Feed Post

Windows Azure Overview Part 4: Security

Listed below are some of the precautions Microsoft has implemented for Windows Azure

This blog post is part of the series on Windows Azure. You can read the rest of this series here (Part 1 ; Part 2 ; Part 3).

There are very few organizations that apply as many security measures as Microsoft does for its Windows Azure service.

Listed below are some of the precautions Microsoft has implemented for Windows Azure to secure your applications and data:

  • Secret Locations of Datacenters

For almost every organization, the datacenter is somewhere inside it. It’s not that hard for an intruder to find out the exact location. Microsoft keeps the information on the wherabouts of their datacenters strictly confidential.

  • Secure Perimeter

In case someone finds out the location of a datacenter and tries to get in, they’ll face an extremely secured perimeter with fences, video surveillance, guards, and motion detectors. All these precautions make it extremely difficult, if not impossible, for someone to get in unauthorized.

  • Biometric Scanners

Even though the external perimeter is secured, there has to be implemented measures to limit the access each individual working in the datacenter is granted. Biometric scanners make sure everyone goes only where they’re authorized to go.

  • Internal Firewalls and Policies

In the unlikely event that someone actually gets unauthorized access to a server and plugs in, they won’t know which data is on which server.  They will have very limited choices to do malicious activities.

  • Reduced OS Attack Surface

The operating system of the servers hosting applications in Windows Azure is a stripped version of Windows Server 2008 R2, with only the services needed for hosting applications. This drastically reduces the attack surface for malicious users.

  • Software Firewalls

If someone actually gets access to a virtual machine that is hosting your application, they will not be able to interact with other virtual machines — even on the same hosting server – because of the implementation of the hypervisor that is running the virtual machines and its capability of completely isolating the virtual machines from each other.

  • Virtual Machine Firewalls

Each virtual machine hosting your application has a built-in firewall that is completely closed by default, and you configure it to allow certain traffic to and from your application.

  • DDoS Defense

All of the Microsoft data centers are connected to the Internet over very big pipes that make it very hard for an intruder to attack the application using (Distributed) Denial of Service attacks.

  • Distributed Data

The data your application is using is stored in three different physical locations by default, to avoid a single point of failure. Furthermore, you have the ability to replicate the data to your on-premise storage server, or even to a different datacenter.

  • SSL certificates

Windows Azure allows you to implement SSL certificates in different places. There are Management certificates for the developers that are creating the application, and there are Application certificates that can be used between the clients and the application, or, between the application and the storage.

  • Domain Identification

The Connect feature of Windows Azure allows you to connect your application to your on-premise Active Directory domain and use AD credentials for authentication in your application.

Stay tuned to Monitis blog posts for future articles on Windows Azure. We will show you how you can use Monitis to monitor the performance of your cloud applications as part of your overall IT infrastructure.

This blog post is part of the blog post series on Windows Azure. You can read the rest of this series here (Part 1Part 2Part 3).

Read the original blog entry...

More Stories By Hovhannes Avoyan

Hovhannes Avoyan is the CEO of PicsArt, Inc.,

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Latest Stories
SYS-CON Events announced today that Pulzze Systems will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Pulzze Systems, Inc. provides infrastructure products for the Internet of Things to enable any connected device and system to carry out matched operations without programming. For more information, visit http://www.pulzzesystems.com.
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
SYS-CON Events announced today that China Unicom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. China United Network Communications Group Co. Ltd ("China Unicom") was officially established in 2009 on the basis of the merger of former China Netcom and former China Unicom. China Unicom mainly operates a full range of telecommunications services including mobile broadband (GSM, WCDMA, LTE F...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...