SlideShare una empresa de Scribd logo
1 de 43
Cloud Computing
#LiveinaCloudyWorld
Haddy El-Haggan
Microsoft Student Partner
Cloud Computing Expert
Overview
• What’s Cloud Computing?
• Differences between Cloud Computing and
other concepts
• The Power Of Cloud – Cloud Benefits
• Security On the Cloud
• Cloud Types
• File Storage & SQL Azure
• Roles
• History Brief
– Mainframe
– Grid Computing
– Client-Server
–Cloud Computing
What’s Cloud Computing?
Cloud Computing
• Cloud Computing is composed of several
layers:
– Infrastructure
– Platform
– Software
Packaged
Software
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Infrastructure
(as a Service)
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Managedbyvendor
Youmanage
Platform
(as a Service)
Managedbyvendor
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Software
(as a Service)
Managedbyvendor
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Cloud Computing Layers
Each Layer is designed for a special category
CLOUD COMPUTING IS A CONCEPT NOT
A TECHNOLOGY
The Power of
Cloud
The Power of Cloud
• Availability
• Agility
• Maintenance
• Efficiency
• Scalability
The Power Of Cloud
• Cost
• Focus
Agility
ONE OF THE BIGGEST CONCERN IS
ALWAYS ABOUT THE SECURITY AND
HOW ARE MY DATA SECURE ON THE
CLOUD?
Platform
(as a Service)
Managedbyvendor
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Microsoft Cloud Solution Security
Overview
• Developers and users must know the
responsibilities the share with the Cloud
Provider
• These are the main layers of security for any
Cloud Provider:
– Human
– Data
– Application
– Host
– Network
– Physical
Microsoft Cloud Solution Security
Overview (Cont.)
• The “human” and “Data” layers are the users’
responsibility and how they manage their data
and its permissions (more information about the
data on Azure to be followed)
• The “Application Layer” depend on the developer
and the security used on it
• Authentication
• Input validation ….
• Recommend to develop using SDL (security
development lifecycle) designed for windows
Vista, Windows 7 and windows Azure
Microsoft Cloud Solution Security
Overview
• “Host” Layer, Windows Azure is hosted on
Windows Server 2008 Hyper-V
• Windows Azure doesn’t depend on Windows
Server 2008 hypervisor , it has its own
hypervisor where the roles and the VM are
hosted and isolated
• Host has 2 main jobs:
– Isolation (every role runs on its own VM)
– Hardening (regular Security Updates)
Microsoft Cloud Solution Security
Overview
• Some Firewall can be configured by the
service owner and some are controlled by the
fabric controller
• “Network” Layer, Windows Azure traffic
through several firewall
• Guest VM
• Host VM
• SQL Azure VM
THERE IS NO ENCRYPTION ON
WINDOWS AZURE
Data Security on Azure
• Windows Azure Compute and Windows Azure
Storage are 2 different things each of them is
hosted on different hardware resources
• In the Storage Architecture the top layer
validates, authenticates, and authorizes requests,
routing them to the partition layer and data layer
where the data exists
• Protect against Data Loss, there are always three
replicates of your data whatever happens
Data Security on Azure
• Isolation: all your data are isolated from the
others by 2 ways:
– Logically
– Physically
• Each type of storage has its own way of access
depending on the developer
• NO DATA ARE ACCESSIBLE BY THE PUBLIC
EXCEPT THE PUBLIC BLOB
Secure Networking
• Network Architecture:
– In Azure there are mainly 4 types of Nodes:
• Fabric Controller Node (Azure Kernel)
• Storage Node
• Compute Node
• Other infrastructure Node
– In the FC Networking there are 3 types of isolated
networks:
• Main VLAN (all untrusted customer nodes)
• FC VLAN (trusted FC networks)
• Device VLAN (contains trusted networks an other
infrastructure devices)
Secure Networking
• No communication is possible to be made
between the VLANs without passing through
several routers for preventing faking traffic
and eavesdropping on other traffic
• The communication is permitted from the FC
VLAN or the Device VLAN to the main VLAN
but not initiated from the main VLAN
Secure Networking
• Azure has the largest internet connections in the
industry
• It is unlikely that someone can cut azure out of
public by producing enough malicious traffic
• If your application on azure is attacked, azure will
create several compute instances to maintain
your application until the attack passes
• Microsoft is considering ways to identify
malicious traffic and block it as it enters the Azure
Fabric, but this sort of protection has not yet
been deployed.
Identity On Azure
• To gain access to your application on the Cloud you
have to pass few steps:
– Authentication
– Authorization
– Monitoring and logging (track users and log their
operations)
• Windows Azure support several identity technology
– Active Directory
– Open ID
– SQL Server
– WIF
Identity On Azure
• Windows Azure supports 2 types of identity in
the Cloud:
– Role based
– Claim Based
• Role based is using Username and password
• Claim based is using Token containing a
collection of Claims
Identity On Azure: Role based
authorization
• It can be used by SQL Azure, Azure Connect
and ASP.NET membership provider
• You only use the username and the password
and the rest are kept in the identity store
• Simple, easy to use and possible to implement
Domain join
Identity on Azure: Azure Connect
• Azure connect support domain join of
windows azure roles to on premises Active
Directory
Identity on Azure : Claim Based
• Claim is a piece of information
• Token is a collection of Claims and are signed
• Security Token Service map the credentials to the
token
• Application is provide with all the identity
information needed
• The management of the identity is not the
application responsibility
• Integration between several identity providers
• Less infrastructure code
Identity On Azure: AppFabric
Access Control
• Enable the developer of using claim based
authorization from enterprises like active
directory, SQL Server
• Also enable the usage of the other identity
provider like live ID, Facebook, Google and
Yahoo.
Types of Cloud
• Private
– Between certain users
• Public
– Accessible by everyone
• Hybrid
– Public/Private
Storage
• BLOB(Binary Large Object)
– Container
– Blob
– Block
• Table Storage
– Table
– Entities
– Partition Key
– Row Key
– Properties
Storage (cont.)
• Queue
• Drive
– Local resource
– String connection
Table Storage Vs. SQL Azure
Table Storage
• Is more scalable
• Semi Structured
• Less Expensive
SQL Azure
• Normal SQL running in
Microsoft Cloud
Environment
• Completely Structured
• Expensive
Roles
Web Role
• Run on the client Side
• Act as a normal ASP.NET
Worker Role
• Background process running
on datacenter
• Can run for hours
• Can communicate to Web
Role though a queue or
WCF
References
• Windows Azure Platform articles from the
trenches
• www.microsoft.com/windowsazure
• Cloud Cover Videos
• Windows Azure Platform V1 3—Chappel
Azure Community in Egypt
• Twitter: Azurecomeg
• Facebook:
www.facebook.com/Azure.Community.Egypt
• E-Mail: azureeg@hotmail.com
Contacts
• Twitter: @Hhaggan
• Email: hhaggan@hotmail.com
• Blog: http://hhaggan.wordpress.com/

Más contenido relacionado

La actualidad más candente

70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks
Georges-Emmanuel TOPE
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 

La actualidad más candente (20)

Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application Isolation
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
70 533 - Module 01 - Introduction to Azure
70 533 - Module 01 - Introduction to Azure70 533 - Module 01 - Introduction to Azure
70 533 - Module 01 - Introduction to Azure
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinha
 
Part 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An OverviewPart 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An Overview
 
Azure virtual network
Azure virtual networkAzure virtual network
Azure virtual network
 
Maxta VM-centric Storage
Maxta VM-centric StorageMaxta VM-centric Storage
Maxta VM-centric Storage
 
Deep dive into azure virtual machines
Deep dive into azure virtual machinesDeep dive into azure virtual machines
Deep dive into azure virtual machines
 
Virtualized containers
Virtualized containersVirtualized containers
Virtualized containers
 
Global Azure Bootcamp: Azure service fabric
Global Azure Bootcamp: Azure service fabric Global Azure Bootcamp: Azure service fabric
Global Azure Bootcamp: Azure service fabric
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Let's Talk About: Azure Networking
Let's Talk About: Azure NetworkingLet's Talk About: Azure Networking
Let's Talk About: Azure Networking
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 

Destacado

MS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case studyMS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case study
Spiffy
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows Azure
Kaushal Bhavsar
 

Destacado (8)

MS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case studyMS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case study
 
Developing Mobile Applications for iOS and Android the Oracle way
Developing Mobile Applications for iOS and Android the Oracle wayDeveloping Mobile Applications for iOS and Android the Oracle way
Developing Mobile Applications for iOS and Android the Oracle way
 
Using obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
Using obi apps to consolidate data for taleo, salesforce and net suite apps_pptUsing obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
Using obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows Azure
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in Oracle
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 

Similar a Cloud computing & windows azure intro

Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
varanasisatyanvesh
 

Similar a Cloud computing & windows azure intro (20)

Security on Windows Azure
Security on Windows AzureSecurity on Windows Azure
Security on Windows Azure
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, august
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Azure Fundamentals Part 2
Azure Fundamentals Part 2Azure Fundamentals Part 2
Azure Fundamentals Part 2
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
Seminar on cloudcomputing
Seminar on cloudcomputingSeminar on cloudcomputing
Seminar on cloudcomputing
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesMicrosoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For Techies
 
Scalability in cloud applications
Scalability in cloud applicationsScalability in cloud applications
Scalability in cloud applications
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginners
 
Azure Stack - Azure Nights User Group
Azure Stack - Azure Nights User GroupAzure Stack - Azure Nights User Group
Azure Stack - Azure Nights User Group
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Microservices in Azure
Microservices in AzureMicroservices in Azure
Microservices in Azure
 

Último

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Cloud computing & windows azure intro

  • 1. Cloud Computing #LiveinaCloudyWorld Haddy El-Haggan Microsoft Student Partner Cloud Computing Expert
  • 2. Overview • What’s Cloud Computing? • Differences between Cloud Computing and other concepts • The Power Of Cloud – Cloud Benefits • Security On the Cloud • Cloud Types • File Storage & SQL Azure • Roles
  • 3.
  • 4. • History Brief – Mainframe – Grid Computing – Client-Server –Cloud Computing What’s Cloud Computing?
  • 5.
  • 6. Cloud Computing • Cloud Computing is composed of several layers: – Infrastructure – Platform – Software
  • 7. Packaged Software Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime Youmanage Infrastructure (as a Service) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime Managedbyvendor Youmanage Platform (as a Service) Managedbyvendor Youmanage Storage Servers Networking O/S Middleware Virtualization Applications Runtime Data Software (as a Service) Managedbyvendor Storage Servers Networking O/S Middleware Virtualization Applications Runtime Data
  • 8. Cloud Computing Layers Each Layer is designed for a special category
  • 9. CLOUD COMPUTING IS A CONCEPT NOT A TECHNOLOGY
  • 11. The Power of Cloud • Availability • Agility • Maintenance • Efficiency • Scalability
  • 12. The Power Of Cloud • Cost • Focus
  • 14. ONE OF THE BIGGEST CONCERN IS ALWAYS ABOUT THE SECURITY AND HOW ARE MY DATA SECURE ON THE CLOUD?
  • 16. Microsoft Cloud Solution Security Overview • Developers and users must know the responsibilities the share with the Cloud Provider • These are the main layers of security for any Cloud Provider: – Human – Data – Application – Host – Network – Physical
  • 17. Microsoft Cloud Solution Security Overview (Cont.) • The “human” and “Data” layers are the users’ responsibility and how they manage their data and its permissions (more information about the data on Azure to be followed) • The “Application Layer” depend on the developer and the security used on it • Authentication • Input validation …. • Recommend to develop using SDL (security development lifecycle) designed for windows Vista, Windows 7 and windows Azure
  • 18.
  • 19.
  • 20. Microsoft Cloud Solution Security Overview • “Host” Layer, Windows Azure is hosted on Windows Server 2008 Hyper-V • Windows Azure doesn’t depend on Windows Server 2008 hypervisor , it has its own hypervisor where the roles and the VM are hosted and isolated • Host has 2 main jobs: – Isolation (every role runs on its own VM) – Hardening (regular Security Updates)
  • 21. Microsoft Cloud Solution Security Overview • Some Firewall can be configured by the service owner and some are controlled by the fabric controller • “Network” Layer, Windows Azure traffic through several firewall • Guest VM • Host VM • SQL Azure VM
  • 22.
  • 23. THERE IS NO ENCRYPTION ON WINDOWS AZURE
  • 24. Data Security on Azure • Windows Azure Compute and Windows Azure Storage are 2 different things each of them is hosted on different hardware resources • In the Storage Architecture the top layer validates, authenticates, and authorizes requests, routing them to the partition layer and data layer where the data exists • Protect against Data Loss, there are always three replicates of your data whatever happens
  • 25. Data Security on Azure • Isolation: all your data are isolated from the others by 2 ways: – Logically – Physically • Each type of storage has its own way of access depending on the developer • NO DATA ARE ACCESSIBLE BY THE PUBLIC EXCEPT THE PUBLIC BLOB
  • 26. Secure Networking • Network Architecture: – In Azure there are mainly 4 types of Nodes: • Fabric Controller Node (Azure Kernel) • Storage Node • Compute Node • Other infrastructure Node – In the FC Networking there are 3 types of isolated networks: • Main VLAN (all untrusted customer nodes) • FC VLAN (trusted FC networks) • Device VLAN (contains trusted networks an other infrastructure devices)
  • 27. Secure Networking • No communication is possible to be made between the VLANs without passing through several routers for preventing faking traffic and eavesdropping on other traffic • The communication is permitted from the FC VLAN or the Device VLAN to the main VLAN but not initiated from the main VLAN
  • 28. Secure Networking • Azure has the largest internet connections in the industry • It is unlikely that someone can cut azure out of public by producing enough malicious traffic • If your application on azure is attacked, azure will create several compute instances to maintain your application until the attack passes • Microsoft is considering ways to identify malicious traffic and block it as it enters the Azure Fabric, but this sort of protection has not yet been deployed.
  • 29. Identity On Azure • To gain access to your application on the Cloud you have to pass few steps: – Authentication – Authorization – Monitoring and logging (track users and log their operations) • Windows Azure support several identity technology – Active Directory – Open ID – SQL Server – WIF
  • 30. Identity On Azure • Windows Azure supports 2 types of identity in the Cloud: – Role based – Claim Based • Role based is using Username and password • Claim based is using Token containing a collection of Claims
  • 31. Identity On Azure: Role based authorization • It can be used by SQL Azure, Azure Connect and ASP.NET membership provider • You only use the username and the password and the rest are kept in the identity store • Simple, easy to use and possible to implement Domain join
  • 32. Identity on Azure: Azure Connect • Azure connect support domain join of windows azure roles to on premises Active Directory
  • 33. Identity on Azure : Claim Based • Claim is a piece of information • Token is a collection of Claims and are signed • Security Token Service map the credentials to the token • Application is provide with all the identity information needed • The management of the identity is not the application responsibility • Integration between several identity providers • Less infrastructure code
  • 34.
  • 35. Identity On Azure: AppFabric Access Control • Enable the developer of using claim based authorization from enterprises like active directory, SQL Server • Also enable the usage of the other identity provider like live ID, Facebook, Google and Yahoo.
  • 36. Types of Cloud • Private – Between certain users • Public – Accessible by everyone • Hybrid – Public/Private
  • 37. Storage • BLOB(Binary Large Object) – Container – Blob – Block • Table Storage – Table – Entities – Partition Key – Row Key – Properties
  • 38. Storage (cont.) • Queue • Drive – Local resource – String connection
  • 39. Table Storage Vs. SQL Azure Table Storage • Is more scalable • Semi Structured • Less Expensive SQL Azure • Normal SQL running in Microsoft Cloud Environment • Completely Structured • Expensive
  • 40. Roles Web Role • Run on the client Side • Act as a normal ASP.NET Worker Role • Background process running on datacenter • Can run for hours • Can communicate to Web Role though a queue or WCF
  • 41. References • Windows Azure Platform articles from the trenches • www.microsoft.com/windowsazure • Cloud Cover Videos • Windows Azure Platform V1 3—Chappel
  • 42. Azure Community in Egypt • Twitter: Azurecomeg • Facebook: www.facebook.com/Azure.Community.Egypt • E-Mail: azureeg@hotmail.com
  • 43. Contacts • Twitter: @Hhaggan • Email: hhaggan@hotmail.com • Blog: http://hhaggan.wordpress.com/