Protecting Data in Microsoft Azure
Total Page:16
File Type:pdf, Size:1020Kb
Protecting Data in Microsoft Azure Protecting Data in Microsoft Azure Abstract Microsoft® is committed to ensuring that your data remains your data, without exception. When stored in Microsoft Azure, data benefits from multiple layers of security and governance technologies, operational practices, and compliance policies in order to enforce data privacy and integrity at a very granular level. This white paper describes such capabilities in Microsoft Azure, including mechanisms for encryption, secrets administration, and access control that you can leverage for managing sensitive data. The sections that follow provide detailed guidance on how to use features in the Microsoft Azure platform to protect critical enterprise data in the cloud, whether structured or unstructured, in-transit, or at-rest. Audience This document focuses on data protection in Microsoft Azure, and is intended for Information Technology (IT) Professionals and IT Implementers who deal with information asset management on a daily basis, either as their main duties or as part of a broader cloud IT management role. This document will be most useful to individuals who are already familiar with Microsoft Azure, and are looking to increase their knowledge of tools and technologies for encryption, access control, and other aspects of data security in the platform and related services. Sections 2.1, 2.2, and 2.3 provide a brief overview of Azure and can be skipped depending on your existing knowledge of Azure services. NOTE: Certain recommendations contained herein may result in increased data, network, or compute resource usage, and increase your license or subscription costs. Published August 2014 (c) 2014 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. You bear the risk of using it. Some examples are for illustration only and are fictitious. No real association is intended or inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. P A G E | 02 Protecting Data in Microsoft Azure Table of Contents 1 OVERVIEW .................................................................................................................................................. 5 2 DATA STORAGE IN MICROSOFT AZURE ................................................................................................ 6 2.1 MICROSOFT AZURE STORAGE .............................................................................................................................................. 7 2.1.1 Data Structures ............................................................................................................................................................. 7 2.1.2 Data Transfers............................................................................................................................................................... 8 2.2 MICROSOFT AZURE SQL DATABASE ................................................................................................................................... 8 2.2.1 Azure SQL Database Structure ................................................................................................................................ 9 2.3 MICROSOFT AZURE ACTIVE DIRECTORY ............................................................................................................................. 9 2.3.1 Azure Active Directory Architecture ...................................................................................................................... 9 2.4 WHO CAN ACCESS YOUR DATA? .................................................................................................................................... 10 2.4.1 Single Sign-On (SSO) ............................................................................................................................................... 11 2.4.2 Two-Factor Authentication (2FA) ........................................................................................................................ 11 2.4.3 Access Controls: Subscriptions ............................................................................................................................. 12 2.4.4 Access Controls: Storage ........................................................................................................................................ 12 2.4.5 Access Controls: Azure Tables vs. SQL Databases ......................................................................................... 12 3 UNDERSTANDING DATA SECURITY .....................................................................................................14 3.1 RISK AND RISK MANAGEMENT ......................................................................................................................................... 14 3.1.1 Understanding Data Risk ....................................................................................................................................... 14 3.2 THREATS TO YOUR DATA................................................................................................................................................... 15 3.2.1 Data Attack Taxonomy ........................................................................................................................................... 16 3.3 MICROSOFT AZURE DEFAULT PROTECTION .................................................................................................................... 16 3.3.1 Data Security in Azure AD ..................................................................................................................................... 19 3.4 PLATFORM ENCRYPTION .................................................................................................................................................... 19 3.4.1 Encryption in Transit ................................................................................................................................................ 20 3.4.1.1 VM to VM ................................................................................................................................................................................ 20 3.4.1.2 Customer to Cloud .............................................................................................................................................................. 20 3.5 DATA DELETION .................................................................................................................................................................. 21 3.5.1 Subscriptions............................................................................................................................................................... 21 3.5.2 Microsoft Azure Storage ......................................................................................................................................... 21 3.5.3 Microsoft Azure Virtual Machines ....................................................................................................................... 22 3.5.4 Azure SQL Database ................................................................................................................................................ 22 3.6 COMPUTE SECURITY FOR DATA IN USE ........................................................................................................................... 22 3.7 PHYSICAL DATA SECURITY ................................................................................................................................................. 23 4 CUSTOMER-CONFIGURABLE PROTECTION .........................................................................................24 4.1 VOLUME LEVEL ENCRYPTION ............................................................................................................................................ 25 4.1.1 BitLocker Drive Encryption .................................................................................................................................... 26 4.1.2 Drive Encryption - Partners ................................................................................................................................... 26 4.1.3 Key Management and Security ............................................................................................................................ 27 P A G E | 03 Protecting Data in Microsoft Azure 4.1.4 Subscription and Service Certificates ................................................................................................................. 27 4.2 ENCRYPTION FOR SQL SERVER IN AZURE VIRTUAL MACHINES ................................................................................... 28 4.2.1 Cloud Implementation ............................................................................................................................................ 28 4.3 AZURE RIGHTS MANAGEMENT SERVICES ........................................................................................................................ 30 4.3.1 RMS Basics: How the RMS Components Work Together ............................................................................ 30 4.3.2 RMS Server Choices .................................................................................................................................................