MTT | Well Architected Security - Incorporating Security into Azure Architecture

%3CLINGO-SUB%20id%3D%22lingo-sub-2652853%22%20slang%3D%22en-US%22%3EMTT%20%7C%20Well%20Architected%20Security%20-%20Incorporating%20Security%20into%20Azure%20Architecture%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2652853%22%20slang%3D%22en-US%22%3E%3CP%3E%3CFONT%20size%3D%225%22%3E%3CSPAN%3E26%20August%202021%2C%201%3A00p-2%3A30p%20CDT%3C%2FSPAN%3E%3C%2FFONT%3E%3CBR%20%2F%3E%3CSTRONG%3ERegister%20at%20%3A%3C%2FSTRONG%3E%26nbsp%3B%3CA%20class%3D%22link%22%20title%3D%22https%3A%2F%2Faka.ms%2Fmttaugwasa%22%20href%3D%22https%3A%2F%2Faka.ms%2Fmttaugwasa%22%20target%3D%22_blank%22%20rel%3D%22noopener%20ugc%20noreferrer%22%3Ehttps%3A%2F%2Faka.ms%2Fmttaugwasa%3C%2FA%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%3EInformation%20Security%20has%20always%20been%20a%20complex%20subject%2C%20and%20it%20evolves%20quickly%20with%20the%20creative%20ideas%20and%20implementations%20of%20attackers%20and%20security%20researchers.%20The%20origin%20of%20security%20vulnerabilities%20started%20with%20identifying%20and%20exploiting%20common%20programming%20errors%20and%20unexpected%20edge%20cases.%20However%20over%20time%2C%20the%20attack%20surface%20that%20an%20attacker%20may%20explore%20and%20exploit%20has%20expanded%20well%20beyond%20that.%20Attackers%20now%20freely%20exploit%20vulnerabilities%20in%20system%20configurations%2C%20operational%20practices%2C%20and%20the%20social%20habits%20of%20the%20systems%E2%80%99%20users.%20As%20system%20complexity%2C%20connectedness%2C%20and%20the%20variety%20of%20users%20increase%2C%20attackers%20have%20more%20opportunities%20to%20identify%20unprotected%20edge%20cases%20and%20to%20%E2%80%9Chack%E2%80%9D%20systems%20into%20doing%20things%20they%20were%20not%20designed%20to%20do.%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%3ESecurity%20is%20one%20of%20the%20most%20important%20aspects%20of%20any%20architecture.%20It%20provides%20confidentiality%2C%20integrity%2C%20and%20availability%20assurances%20against%20deliberate%20attacks%20and%20abuse%20of%20your%20valuable%20data%20and%20systems.%20Losing%20these%20assurances%20can%20negatively%20impact%20your%20business%20operations%20and%20revenue%2C%20as%20well%20as%20your%20organization%E2%80%99s%20reputation%20in%20the%20marketplace.%20In%20the%20following%20series%20of%20articles%2C%20we%E2%80%99ll%20discuss%20key%20architectural%20considerations%20and%20principles%20for%20security%20and%20how%20they%20apply%20to%20Azure.%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%3ESpeaker%3C%2FSPAN%3E%3CBR%20%2F%3E%3CSPAN%3EChris%20Nadler%3C%2FSPAN%3E%3CBR%20%2F%3E%3CSPAN%3EMicrosoft%3C%2FSPAN%3E%3CBR%20%2F%3E%3CBR%20%2F%3E%3CSPAN%3ECustomer%20Engineer%20specializing%20in%20Active%20Directory%2FAzure%20security%20and%20PKI%20with%2015%2B%20years%20of%20experience.%E2%80%AF%E2%80%AF%20He%20works%20as%20a%20dedicated%20cybersecurity%20and%20Azure%20engineer%20(still%20valid%3F)%20to%20provide%20customers%20solutions%20and%20best%20practices.%E2%80%AF%20He%20also%20helps%20develop%20new%20Microsoft%E2%80%AFservices%20and%20content.%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E
Microsoft

26 August 2021, 1:00p-2:30p CDT
Register at : https://aka.ms/mttaugwasa

Information Security has always been a complex subject, and it evolves quickly with the creative ideas and implementations of attackers and security researchers. The origin of security vulnerabilities started with identifying and exploiting common programming errors and unexpected edge cases. However over time, the attack surface that an attacker may explore and exploit has expanded well beyond that. Attackers now freely exploit vulnerabilities in system configurations, operational practices, and the social habits of the systems’ users. As system complexity, connectedness, and the variety of users increase, attackers have more opportunities to identify unprotected edge cases and to “hack” systems into doing things they were not designed to do.

Security is one of the most important aspects of any architecture. It provides confidentiality, integrity, and availability assurances against deliberate attacks and abuse of your valuable data and systems. Losing these assurances can negatively impact your business operations and revenue, as well as your organization’s reputation in the marketplace. In the following series of articles, we’ll discuss key architectural considerations and principles for security and how they apply to Azure.

Speaker
Chris Nadler
Microsoft

Customer Engineer specializing in Active Directory/Azure security and PKI with 15+ years of experience.   He works as a dedicated cybersecurity and Azure engineer (still valid?) to provide customers solutions and best practices.  He also helps develop new Microsoft services and content.

0 Replies