Try for free Book a demo

Azure Governance and Security for Enterprise Integration Under the Hood

Events

4 Mins Read | Last modified on February 28th, 2024

This Blog is the readable version of one of the exclusive sessions of the Integrate 2020, which is “Azure Governance and Security for Enterprise Integration under the hood” by well-known Microsoft MVP – Nino Crudele.

To give an overview of this session, it was more on Security and governance of the Enterprise Integrations. It covered a lot of hacking methodologies by hackers and tools in Azure to prevent from them all. This session was focused on three areas that are mentioned below

  • About Hacking and Hackers
  • Real-world hacking insights
  • Ways to secure Azure

Nino started his session by introducing himself to the attendees. He is a freelance architect and a Certified Ethical Hacker. His area of focus is on Azure Governance and Security. He is also a Microsoft MVP for 14 Years since 2006.

Now let us start with a detailed note on the topics covered in the session.

Hacking and Hackers

To Beat a Hacker, you must think like a Hacker

Nino began his session with the above quote and showed some common profiles of the hackers

Common profiles of Hackers

He explained how a hacker of other organizations can easily hack your organization information by just getting into a company as an employee and slowly get all the information and secret that are needed.

Most Critical Areas

From his experience, he listed the three critical areas where most of the attacks on Azure would happen,

  1. Azure Active Directory
  2. Storage
  3. Network

And Below are some attacks that happen on respective areas

  1. Azure Active Directory – Privileged Escalation
  2. Storage – Phishing/Ransomware
  3. Network – DDOS and RDP/SSH

Critical areas of attack

He mentioned some common challenges in being a global admin. Global admin will have access to all the Management groups, Subscriptions, and tenant. So, it is very important to enable services like Multi-factor Authentication (MFA). He also gave statics on some real-world numbers of people using MFA in different years.

Enable MFA Service

Tools

He started this section with some physical hacking tools like duplicate keys and WIFI hacking tools connected with raspberry pi etc.,

He also introduced some software tools to get insights about hacking that were happening at the time of the session.

1.) Digital Attack Map – To know about DDOS attack that is happening at present

Digital Attack Map

2.) Cyberthreat Kaspersky- Real-time hacking information tool

Cyberthreat Kaspersky

3.) Shodan – tool to know information about virtual machine data

Shodan tool

He also showed a tool named Maltego which is works and explains deeper on what is the system that relates to the specified system. From this tool, hackers can easily get the necessary information like what kind of tools an organization is using, who is the manager and who is admin, and what are the naming conventions being followed in an organization that are very much useful for hackers.

Maltego tool

He also showed a tool named Maltego which is works and explains deeper on what is the system that relates to the specified system. From this tool, hackers can easily get the necessary information like what kind of tools an organization is using, who is the manager and who is admin, and what are the naming conventions being followed in an organization that is very much useful for hackers.

SQL Injection attack with Kali Linux

“Even though Azure Sentinel prevents and detects the attack. It will get to see the last node from where the attack has come. It cannot easily track the source IP address of the attacker. So, it is even more important to keep our data more secure” he advised.

Conclusion

Finally, it was a Q&A session. Nino covered the session very lively and gave some real-world insights and advice regarding the security of our Azure resources. Thanks for his wonderful session that covered everything related to security and governance.

This is short coverage of the session and Stay tuned for more…

This article was originally published on Jun 2, 2020. It was most recently updated on Feb 28, 2024.

Advanced Cloud Management Platform - Request Demo CTA

Related Articles