Watch videos with subtitles in your language, upload your videos, create your own subtitles! Click here to learn more on "how to Dotsub"

TC-029-temp

0 (0 Likes / 0 Dislikes)
>> In this video we'll talk about securing your cloud resources is a shared responsibility between you and Microsoft and what that means. Let's start with Microsoft. Microsoft is responsible for the physical security of its data centers, as well as the entire Azure platform, which provides strong levels of cloud security at the software layer which meets the security, privacy, and compliance needs of our customers. You and your organization however, own your data and identities, and have the responsibility for protecting them along with the security of your on-premises resources and the security of your cloud components, over which you have control. Microsoft gives you security controls and capabilities to help you protect your data and applications, but your degree of responsibility for security is based upon the type of cloud service you use, whether it's SaaS, PaaS, or IaaS. And as you may know, the more control you desire, the more responsibility you assume in securing your cloud resources. For example, if you want full control of managing your own virtual machines in IaaS, you assume the responsibility of securing the operating system, the network, the applications running on those VMs, the identity and directory infrastructure, and accounts and access management. However, if you use a SaaS-based service like Office365, Microsoft takes care of all the underlying operating system updates, network security considerations, the application itself, and provides a mechanism for identity and directory infrastructure management. All you need to do is make sure to give your organization's users the proper access to the software. For all services and software managed by Microsoft, there are built-in mechanisms for authentication and authorization. For instance, Azure employs multi-factor authentication, requiring the use of more than one verification method as a critical second layer of security for sign-ins and transactions. Azure also provides role-based access control, known as RBAC, which gives you the control to define roles for people to grant them only the amount of access that they need to perform their jobs while working with Azure services. Beyond cloud model considerations, there are additional services in place to help your organization ensure a tighter degree of control of security and active threat monitoring. As you continue learning more about security, you'll work with these services and learn about the best practices and how to employ them in your organization's environment. A secure cloud environment is a partnership between you and Microsoft. Microsoft provides the tools and services to enable a secure environment in varying degrees depending upon the services in question. You must undertake the task of understanding how to leverage these tools as well as choosing to employ them for your own specific situation.

Video Details

Duration: 2 minutes and 42 seconds
Country:
Language: English
License: Dotsub - Standard License
Genre: None
Views: 4
Posted by: csintl on Aug 29, 2018

TC-029-temp

Caption and Translate

    Sign In/Register for Dotsub above to caption this video.