SlideShare una empresa de Scribd logo
1 de 43
Cloud Computing
#LiveinaCloudyWorld
Haddy El-Haggan
Microsoft Student Partner
Cloud Computing Expert
Overview
• What’s Cloud Computing?
• Differences between Cloud Computing and
other concepts
• The Power Of Cloud – Cloud Benefits
• Security On the Cloud
• Cloud Types
• File Storage & SQL Azure
• Roles
• History Brief
– Mainframe
– Grid Computing
– Client-Server
–Cloud Computing
What’s Cloud Computing?
Cloud Computing
• Cloud Computing is composed of several
layers:
– Infrastructure
– Platform
– Software
Packaged
Software
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Youmanage
Infrastructure
(as a Service)
Storage
Servers
Networking
O/S
Middleware
Virtualization
Data
Applications
Runtime
Managedbyvendor
Youmanage
Platform
(as a Service)
Managedbyvendor
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Software
(as a Service)
Managedbyvendor
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Cloud Computing Layers
Each Layer is designed for a special category
CLOUD COMPUTING IS A CONCEPT NOT
A TECHNOLOGY
The Power of
Cloud
The Power of Cloud
• Availability
• Agility
• Maintenance
• Efficiency
• Scalability
The Power Of Cloud
• Cost
• Focus
Agility
ONE OF THE BIGGEST CONCERN IS
ALWAYS ABOUT THE SECURITY AND
HOW ARE MY DATA SECURE ON THE
CLOUD?
Platform
(as a Service)
Managedbyvendor
Youmanage
Storage
Servers
Networking
O/S
Middleware
Virtualization
Applications
Runtime
Data
Microsoft Cloud Solution Security
Overview
• Developers and users must know the
responsibilities the share with the Cloud
Provider
• These are the main layers of security for any
Cloud Provider:
– Human
– Data
– Application
– Host
– Network
– Physical
Microsoft Cloud Solution Security
Overview (Cont.)
• The “human” and “Data” layers are the users’
responsibility and how they manage their data
and its permissions (more information about the
data on Azure to be followed)
• The “Application Layer” depend on the developer
and the security used on it
• Authentication
• Input validation ….
• Recommend to develop using SDL (security
development lifecycle) designed for windows
Vista, Windows 7 and windows Azure
Microsoft Cloud Solution Security
Overview
• “Host” Layer, Windows Azure is hosted on
Windows Server 2008 Hyper-V
• Windows Azure doesn’t depend on Windows
Server 2008 hypervisor , it has its own
hypervisor where the roles and the VM are
hosted and isolated
• Host has 2 main jobs:
– Isolation (every role runs on its own VM)
– Hardening (regular Security Updates)
Microsoft Cloud Solution Security
Overview
• Some Firewall can be configured by the
service owner and some are controlled by the
fabric controller
• “Network” Layer, Windows Azure traffic
through several firewall
• Guest VM
• Host VM
• SQL Azure VM
THERE IS NO ENCRYPTION ON
WINDOWS AZURE
Data Security on Azure
• Windows Azure Compute and Windows Azure
Storage are 2 different things each of them is
hosted on different hardware resources
• In the Storage Architecture the top layer
validates, authenticates, and authorizes requests,
routing them to the partition layer and data layer
where the data exists
• Protect against Data Loss, there are always three
replicates of your data whatever happens
Data Security on Azure
• Isolation: all your data are isolated from the
others by 2 ways:
– Logically
– Physically
• Each type of storage has its own way of access
depending on the developer
• NO DATA ARE ACCESSIBLE BY THE PUBLIC
EXCEPT THE PUBLIC BLOB
Secure Networking
• Network Architecture:
– In Azure there are mainly 4 types of Nodes:
• Fabric Controller Node (Azure Kernel)
• Storage Node
• Compute Node
• Other infrastructure Node
– In the FC Networking there are 3 types of isolated
networks:
• Main VLAN (all untrusted customer nodes)
• FC VLAN (trusted FC networks)
• Device VLAN (contains trusted networks an other
infrastructure devices)
Secure Networking
• No communication is possible to be made
between the VLANs without passing through
several routers for preventing faking traffic
and eavesdropping on other traffic
• The communication is permitted from the FC
VLAN or the Device VLAN to the main VLAN
but not initiated from the main VLAN
Secure Networking
• Azure has the largest internet connections in the
industry
• It is unlikely that someone can cut azure out of
public by producing enough malicious traffic
• If your application on azure is attacked, azure will
create several compute instances to maintain
your application until the attack passes
• Microsoft is considering ways to identify
malicious traffic and block it as it enters the Azure
Fabric, but this sort of protection has not yet
been deployed.
Identity On Azure
• To gain access to your application on the Cloud you
have to pass few steps:
– Authentication
– Authorization
– Monitoring and logging (track users and log their
operations)
• Windows Azure support several identity technology
– Active Directory
– Open ID
– SQL Server
– WIF
Identity On Azure
• Windows Azure supports 2 types of identity in
the Cloud:
– Role based
– Claim Based
• Role based is using Username and password
• Claim based is using Token containing a
collection of Claims
Identity On Azure: Role based
authorization
• It can be used by SQL Azure, Azure Connect
and ASP.NET membership provider
• You only use the username and the password
and the rest are kept in the identity store
• Simple, easy to use and possible to implement
Domain join
Identity on Azure: Azure Connect
• Azure connect support domain join of
windows azure roles to on premises Active
Directory
Identity on Azure : Claim Based
• Claim is a piece of information
• Token is a collection of Claims and are signed
• Security Token Service map the credentials to the
token
• Application is provide with all the identity
information needed
• The management of the identity is not the
application responsibility
• Integration between several identity providers
• Less infrastructure code
Identity On Azure: AppFabric
Access Control
• Enable the developer of using claim based
authorization from enterprises like active
directory, SQL Server
• Also enable the usage of the other identity
provider like live ID, Facebook, Google and
Yahoo.
Types of Cloud
• Private
– Between certain users
• Public
– Accessible by everyone
• Hybrid
– Public/Private
Storage
• BLOB(Binary Large Object)
– Container
– Blob
– Block
• Table Storage
– Table
– Entities
– Partition Key
– Row Key
– Properties
Storage (cont.)
• Queue
• Drive
– Local resource
– String connection
Table Storage Vs. SQL Azure
Table Storage
• Is more scalable
• Semi Structured
• Less Expensive
SQL Azure
• Normal SQL running in
Microsoft Cloud
Environment
• Completely Structured
• Expensive
Roles
Web Role
• Run on the client Side
• Act as a normal ASP.NET
Worker Role
• Background process running
on datacenter
• Can run for hours
• Can communicate to Web
Role though a queue or
WCF
References
• Windows Azure Platform articles from the
trenches
• www.microsoft.com/windowsazure
• Cloud Cover Videos
• Windows Azure Platform V1 3—Chappel
Azure Community in Egypt
• Twitter: Azurecomeg
• Facebook:
www.facebook.com/Azure.Community.Egypt
• E-Mail: azureeg@hotmail.com
Contacts
• Twitter: @Hhaggan
• Email: hhaggan@hotmail.com
• Blog: http://hhaggan.wordpress.com/

Más contenido relacionado

La actualidad más candente

70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks
Georges-Emmanuel TOPE
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
Mangesh Gunjal
 

La actualidad más candente (20)

Application layering vs Application Isolation
Application layering vs Application IsolationApplication layering vs Application Isolation
Application layering vs Application Isolation
 
Citrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public CloudCitrix Cloud XL - Running Ctirix in Public Cloud
Citrix Cloud XL - Running Ctirix in Public Cloud
 
Enter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s AssetsEnter The Matrix Securing Azure’s Assets
Enter The Matrix Securing Azure’s Assets
 
State of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User ComputingState of the EUC - 2020 What's new in End-User Computing
State of the EUC - 2020 What's new in End-User Computing
 
70 533 - Module 01 - Introduction to Azure
70 533 - Module 01 - Introduction to Azure70 533 - Module 01 - Introduction to Azure
70 533 - Module 01 - Introduction to Azure
 
Migrate to WVD and Beyond
Migrate to WVD and BeyondMigrate to WVD and Beyond
Migrate to WVD and Beyond
 
Azure WAF
Azure WAFAzure WAF
Azure WAF
 
Netscaler and system center
Netscaler and system centerNetscaler and system center
Netscaler and system center
 
Azure with citrix by bipeen sinha
Azure with citrix by bipeen sinhaAzure with citrix by bipeen sinha
Azure with citrix by bipeen sinha
 
Part 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An OverviewPart 01: Azure Virtual Networks – An Overview
Part 01: Azure Virtual Networks – An Overview
 
Azure virtual network
Azure virtual networkAzure virtual network
Azure virtual network
 
Maxta VM-centric Storage
Maxta VM-centric StorageMaxta VM-centric Storage
Maxta VM-centric Storage
 
Deep dive into azure virtual machines
Deep dive into azure virtual machinesDeep dive into azure virtual machines
Deep dive into azure virtual machines
 
Virtualized containers
Virtualized containersVirtualized containers
Virtualized containers
 
Global Azure Bootcamp: Azure service fabric
Global Azure Bootcamp: Azure service fabric Global Azure Bootcamp: Azure service fabric
Global Azure Bootcamp: Azure service fabric
 
Azure Key Vault - Getting Started
Azure Key Vault - Getting StartedAzure Key Vault - Getting Started
Azure Key Vault - Getting Started
 
Let's Talk About: Azure Networking
Let's Talk About: Azure NetworkingLet's Talk About: Azure Networking
Let's Talk About: Azure Networking
 
Windows Azure Security Features And Functionality
Windows Azure Security Features And FunctionalityWindows Azure Security Features And Functionality
Windows Azure Security Features And Functionality
 
70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks70 533 - Module 02 : Implementing and Managing Virtual Networks
70 533 - Module 02 : Implementing and Managing Virtual Networks
 
Virtualization presentation
Virtualization presentationVirtualization presentation
Virtualization presentation
 

Destacado

MS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case studyMS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case study
Spiffy
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows Azure
Kaushal Bhavsar
 

Destacado (8)

MS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case studyMS Cloud Day - Introduction to Windows Azure platform and real world case study
MS Cloud Day - Introduction to Windows Azure platform and real world case study
 
Developing Mobile Applications for iOS and Android the Oracle way
Developing Mobile Applications for iOS and Android the Oracle wayDeveloping Mobile Applications for iOS and Android the Oracle way
Developing Mobile Applications for iOS and Android the Oracle way
 
Using obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
Using obi apps to consolidate data for taleo, salesforce and net suite apps_pptUsing obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
Using obi apps to consolidate data for taleo, salesforce and net suite apps_ppt
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Introduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows AzureIntroduction to Cloud Computing and Windows Azure
Introduction to Cloud Computing and Windows Azure
 
Device to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in OracleDevice to Intelligence, IOT and Big Data in Oracle
Device to Intelligence, IOT and Big Data in Oracle
 
The Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft AzureThe Layman's Guide to Microsoft Azure
The Layman's Guide to Microsoft Azure
 
Azure Cloud PPT
Azure Cloud PPTAzure Cloud PPT
Azure Cloud PPT
 

Similar a Cloud computing & windows azure intro

Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
varanasisatyanvesh
 

Similar a Cloud computing & windows azure intro (20)

Security on Windows Azure
Security on Windows AzureSecurity on Windows Azure
Security on Windows Azure
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Tokyo azure meetup #8 azure update, august
Tokyo azure meetup #8   azure update, augustTokyo azure meetup #8   azure update, august
Tokyo azure meetup #8 azure update, august
 
Tokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, AugustTokyo azure meetup #8 - Azure Update, August
Tokyo azure meetup #8 - Azure Update, August
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Azure Fundamentals Part 2
Azure Fundamentals Part 2Azure Fundamentals Part 2
Azure Fundamentals Part 2
 
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...Simplify hybrid data integration at an enterprise scale. Integrate all your d...
Simplify hybrid data integration at an enterprise scale. Integrate all your d...
 
Seminar on cloudcomputing
Seminar on cloudcomputingSeminar on cloudcomputing
Seminar on cloudcomputing
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For TechiesMicrosoft Azure Hybrid Cloud - Getting Started For Techies
Microsoft Azure Hybrid Cloud - Getting Started For Techies
 
Scalability in cloud applications
Scalability in cloud applicationsScalability in cloud applications
Scalability in cloud applications
 
KoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginnersKoprowskiT_SQLSatMoscow_WASDforBeginners
KoprowskiT_SQLSatMoscow_WASDforBeginners
 
Azure Stack - Azure Nights User Group
Azure Stack - Azure Nights User GroupAzure Stack - Azure Nights User Group
Azure Stack - Azure Nights User Group
 
Cloud computing(ppt)
Cloud computing(ppt)Cloud computing(ppt)
Cloud computing(ppt)
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Microservices in Azure
Microservices in AzureMicroservices in Azure
Microservices in Azure
 

Último

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Último (20)

PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 

Cloud computing & windows azure intro

  • 1. Cloud Computing #LiveinaCloudyWorld Haddy El-Haggan Microsoft Student Partner Cloud Computing Expert
  • 2. Overview • What’s Cloud Computing? • Differences between Cloud Computing and other concepts • The Power Of Cloud – Cloud Benefits • Security On the Cloud • Cloud Types • File Storage & SQL Azure • Roles
  • 3.
  • 4. • History Brief – Mainframe – Grid Computing – Client-Server –Cloud Computing What’s Cloud Computing?
  • 5.
  • 6. Cloud Computing • Cloud Computing is composed of several layers: – Infrastructure – Platform – Software
  • 7. Packaged Software Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime Youmanage Infrastructure (as a Service) Storage Servers Networking O/S Middleware Virtualization Data Applications Runtime Managedbyvendor Youmanage Platform (as a Service) Managedbyvendor Youmanage Storage Servers Networking O/S Middleware Virtualization Applications Runtime Data Software (as a Service) Managedbyvendor Storage Servers Networking O/S Middleware Virtualization Applications Runtime Data
  • 8. Cloud Computing Layers Each Layer is designed for a special category
  • 9. CLOUD COMPUTING IS A CONCEPT NOT A TECHNOLOGY
  • 11. The Power of Cloud • Availability • Agility • Maintenance • Efficiency • Scalability
  • 12. The Power Of Cloud • Cost • Focus
  • 14. ONE OF THE BIGGEST CONCERN IS ALWAYS ABOUT THE SECURITY AND HOW ARE MY DATA SECURE ON THE CLOUD?
  • 16. Microsoft Cloud Solution Security Overview • Developers and users must know the responsibilities the share with the Cloud Provider • These are the main layers of security for any Cloud Provider: – Human – Data – Application – Host – Network – Physical
  • 17. Microsoft Cloud Solution Security Overview (Cont.) • The “human” and “Data” layers are the users’ responsibility and how they manage their data and its permissions (more information about the data on Azure to be followed) • The “Application Layer” depend on the developer and the security used on it • Authentication • Input validation …. • Recommend to develop using SDL (security development lifecycle) designed for windows Vista, Windows 7 and windows Azure
  • 18.
  • 19.
  • 20. Microsoft Cloud Solution Security Overview • “Host” Layer, Windows Azure is hosted on Windows Server 2008 Hyper-V • Windows Azure doesn’t depend on Windows Server 2008 hypervisor , it has its own hypervisor where the roles and the VM are hosted and isolated • Host has 2 main jobs: – Isolation (every role runs on its own VM) – Hardening (regular Security Updates)
  • 21. Microsoft Cloud Solution Security Overview • Some Firewall can be configured by the service owner and some are controlled by the fabric controller • “Network” Layer, Windows Azure traffic through several firewall • Guest VM • Host VM • SQL Azure VM
  • 22.
  • 23. THERE IS NO ENCRYPTION ON WINDOWS AZURE
  • 24. Data Security on Azure • Windows Azure Compute and Windows Azure Storage are 2 different things each of them is hosted on different hardware resources • In the Storage Architecture the top layer validates, authenticates, and authorizes requests, routing them to the partition layer and data layer where the data exists • Protect against Data Loss, there are always three replicates of your data whatever happens
  • 25. Data Security on Azure • Isolation: all your data are isolated from the others by 2 ways: – Logically – Physically • Each type of storage has its own way of access depending on the developer • NO DATA ARE ACCESSIBLE BY THE PUBLIC EXCEPT THE PUBLIC BLOB
  • 26. Secure Networking • Network Architecture: – In Azure there are mainly 4 types of Nodes: • Fabric Controller Node (Azure Kernel) • Storage Node • Compute Node • Other infrastructure Node – In the FC Networking there are 3 types of isolated networks: • Main VLAN (all untrusted customer nodes) • FC VLAN (trusted FC networks) • Device VLAN (contains trusted networks an other infrastructure devices)
  • 27. Secure Networking • No communication is possible to be made between the VLANs without passing through several routers for preventing faking traffic and eavesdropping on other traffic • The communication is permitted from the FC VLAN or the Device VLAN to the main VLAN but not initiated from the main VLAN
  • 28. Secure Networking • Azure has the largest internet connections in the industry • It is unlikely that someone can cut azure out of public by producing enough malicious traffic • If your application on azure is attacked, azure will create several compute instances to maintain your application until the attack passes • Microsoft is considering ways to identify malicious traffic and block it as it enters the Azure Fabric, but this sort of protection has not yet been deployed.
  • 29. Identity On Azure • To gain access to your application on the Cloud you have to pass few steps: – Authentication – Authorization – Monitoring and logging (track users and log their operations) • Windows Azure support several identity technology – Active Directory – Open ID – SQL Server – WIF
  • 30. Identity On Azure • Windows Azure supports 2 types of identity in the Cloud: – Role based – Claim Based • Role based is using Username and password • Claim based is using Token containing a collection of Claims
  • 31. Identity On Azure: Role based authorization • It can be used by SQL Azure, Azure Connect and ASP.NET membership provider • You only use the username and the password and the rest are kept in the identity store • Simple, easy to use and possible to implement Domain join
  • 32. Identity on Azure: Azure Connect • Azure connect support domain join of windows azure roles to on premises Active Directory
  • 33. Identity on Azure : Claim Based • Claim is a piece of information • Token is a collection of Claims and are signed • Security Token Service map the credentials to the token • Application is provide with all the identity information needed • The management of the identity is not the application responsibility • Integration between several identity providers • Less infrastructure code
  • 34.
  • 35. Identity On Azure: AppFabric Access Control • Enable the developer of using claim based authorization from enterprises like active directory, SQL Server • Also enable the usage of the other identity provider like live ID, Facebook, Google and Yahoo.
  • 36. Types of Cloud • Private – Between certain users • Public – Accessible by everyone • Hybrid – Public/Private
  • 37. Storage • BLOB(Binary Large Object) – Container – Blob – Block • Table Storage – Table – Entities – Partition Key – Row Key – Properties
  • 38. Storage (cont.) • Queue • Drive – Local resource – String connection
  • 39. Table Storage Vs. SQL Azure Table Storage • Is more scalable • Semi Structured • Less Expensive SQL Azure • Normal SQL running in Microsoft Cloud Environment • Completely Structured • Expensive
  • 40. Roles Web Role • Run on the client Side • Act as a normal ASP.NET Worker Role • Background process running on datacenter • Can run for hours • Can communicate to Web Role though a queue or WCF
  • 41. References • Windows Azure Platform articles from the trenches • www.microsoft.com/windowsazure • Cloud Cover Videos • Windows Azure Platform V1 3—Chappel
  • 42. Azure Community in Egypt • Twitter: Azurecomeg • Facebook: www.facebook.com/Azure.Community.Egypt • E-Mail: azureeg@hotmail.com
  • 43. Contacts • Twitter: @Hhaggan • Email: hhaggan@hotmail.com • Blog: http://hhaggan.wordpress.com/