Skip to content

Microsoft Summer Bootcamp Recap - Day 3

Zero Trust 101: Embracing Proactive Security

Speaker

  • Vik Verma - Information Security Global Black Belt

Key Notes

  • One new reality intensifies security challenges - how do we drive operational resiliency while strengthening cybersecurity?

    • Hybrid Work

    • Threat Protection across multiple cloud/platforms

    • Enforcing security policies across layers

    • Increase diversity of users and endpoints accessing the network

    • Complex digital environments full of unknown vulnerabilities

    • Zero trust required by enterprises and governments worldwide

    • 81% of enterprises have begun the move towards hybrid workplace

    • 55% of organizations report detecting a phishing attack in the last 18 months

    • 58% days longer to respond to a breach when more than half the employees are remote

    • 1070% increase in ransomware between July 2020 and June 2021

  • Zero Trust strategy defined - A proactive, integrated approach to secure across all layers of the digital estate that explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to respond to threats

    • Guiding Principals of Zero Trust

      • Verify Explicitly

      • Use Least Privilege

      • Assume Breach

    • Implementing controls across pillars - Governance and Threat Protection across:

      • Identities, Endpoints, Apps, Data, Infrastructure, and Network
    • Identities

      • Secure access for any identity, from anywhere, to any app, AI, or resource

        • Establish Zero Trust access controls

        • Secure access for your employees

        • Secure access for customers/partners

        • Secure access in any cloud

        • Secure access at the speed and scale of AI

      • Unified approach for Identity Security

        • Securely provide remote access to only approved applications

        • Automatically provide access based on the role

        • Remove all permissions and licenses when employees leave

        • Allow only approved internet services to be accessed

    • Endpoints

      • Endpoint Security Management:

        • Simple, Cross-platform, unified endpoint security management console

        • Intuitive, advanced policy management capabilities

        • Security controls granularity and completeness

        • Continuous assessment and reporting of endpoint state

    • Data

      • Data Security Incidents are Widespread: 83% of organizations experience more than one data breach in their lifetime

      • Insiders account for 20% of data breaches, adding to costs: $15.4M is the total average cost of activities to resolve insider threats over a 12-month period

      • Organizations are concerned about data leak in Generative AI: 80%+ of leaders cited leakage of sensitive data as their main concern around adopting Generative AI

  • Implementing Zero Trust Strategy

    • Align with Microsoft Zero Trust Adoption Framework (Now a part of Exposure Management)

    • Track Metrics to Understand Gaps

    • Get Actionable Recommendations

    • "Zero Trust is a Transformation" - Including multiple modernization initiatives:

      • Secure Identities and Access - Modern Identity & Access Control

      • Modern Security Operations (SOC)

      • Infrastructure & Development Security

      • Data Security & Governance, Risk, Compliance (GRC)

      • IoT and OT Security

    • Zero Trust Rapid Modernization Plan (RaMP)


Unlocking the Power of Microsoft Entra Suite: Comprehensive Security and Identity Management for the Modern Enterprise

Speaker

  • Vik Verma - Information Security Global Black Belt

Key Notes

  • Agenda

    • Introduction - Identity as the key security vertical

    • Secure remote access with Entra Private Access

    • Automate identity and access lifecycle with Entra ID Governance

    • Monitor and protect network access with Entra Internet Access

    • Make onboarding efficient and secure with Verified ID

    • Unifying to maximize business impact

  • Entra Suite Overview

    • Unify access controls across identity, endpoint, and network

    • Secure access to apps and resources for on-premises and any cloud

    • Ensure least privilege access to any app or resource, including AI

    • Improve the user experience for remote, home, and in-office work

  • Microsoft Entra Suite

    • Security Service Edge

    • Identity Protection

    • Governance

    • Identity Verification

  • Enterprise Identity and Network Security

    • Business Outcome 1: Securely provide access to essential private and public resources

      • Legacy network security approaches are no longer sufficient

        • Challenges with conventional approaches include:

          • Dramatic traffic increase strains network capacity and on-premises security stack. Sub-optimal user experience on account of traffic hair-pinning.

          • Users circumvent IT controls and access resources directly

          • Compromised users/devices can move laterally on traditional corporate networks.

      • Modernize private app access with an identity-centric ZTNA (Zero Trust Network Access)

      • From VPN to ZTNA

        • Quick Access - Easy migration from VPNs to Zero Trust Network Access to all private apps with Quick Access policy

        • App Discovery - Discover apps and onboard/register them in Entra ID

        • Per App Access - Configure access to a well-known private app with a policy

        • Rich apps and app segments - Support for non-https apps with SSO for legacy protocols like Kerberos

        • App groups and policies - Assign policies to individual apps or to a group of apps.

        • Enable seamless user experience with SSO - by allowing SSO access to popular SaaS apps, on-premises and custom-built apps on any cloud, for any user type, and any identity.

        • Secure business-critical Private and Public Apps with Unified Access Policies.

      • In Summary

        • Microsoft Entra Private Access:

          • Replaces legacy VPN with an identity-centric ZTNA

          • Enforces adaptive Conditional Access across all private resources

          • Delivers fast, consistent access at global scale.

    • Business Outcome 2: Automate employee lifecycle management

      • Automated Identity Lifecycle Management

        • Provision Identities from HRS / System of Record (SOR) - Joiner, Mover, Leaver (JML)

          • Apply admin credentials information such as username, password, web service API for Entra ID, as well as On-Premises AD Domain select and Default OU.
        • API-Driven Provisioning

    • Business Outcome 3: Role-based access provisioning across all apps and resources

      • Role-Based Access Management

        • Provision/Update Identities from HRS / System of Record (SOR) - Joiner, Mover, Leaver (JML)

        • Define the Role itself as an 'Access Package'

          • Add apps and resources as part of the Access Package

            • This includes the Role access included in each of the Application, SharePoint Site, Group, and Team etc.
          • Integrating external / disconnected applications

            • This includes custom extensions to Stage based on a flow
        • Role approval requirements

          • Includes "require approval", "require requestor's justification", and "1, 2, or 3 stages of approval"
        • Role lifecycle

          • Includes Expiration of access and access review (similar to Privilege Identity Management)
        • You can also configure an Auto Assignment policy

          • This flows similar to Dynamic Security groups using Rule Syntax.

            • This includes the ability to automatically create and remove assignments.
        • Access Packages can be requested by users, set by All Members (Including Guests), All Members (Excluding Guests), Specific Users, or Admin Assignment Only.

      • Lifecycle Orchestration (Joiner-Mover-Leaver)

        • Create and Use templates tagged as 'Joiner', 'Mover', and 'Leaver'.

        • Review and append tasks assigned to the template.

          • This can include such tasks as:

            • Add user to groups

            • Disable user account

            • Delete user account

            • Remove all licenses from user

            • and Many more.

          • This also allows for a "Send email before users' last day" function.

    • Business Outcome 4: Securely collaborate with External partners and Subsidiaries

      • Secure External Collaboration (External Tenant Restrictions in Entra ID)

        • Manage Inbound and Outbound Access settings

        • Define roles targeted to external partners/vendors

      • Access Certification and Policy Enforcement

        • Identify Inactive External Users using Microsoft Entra ID's 'Insights and Reporting | Inactive guest accounts'

          • This will provide an overview of guest accounts inactive in the past 90 days.
        • Access Reviews - Remove inactive external guests from your tenant

          • To do this:

            • Scope to Guest Users Only

            • Determine the desired inactivity period

            • Set action to apply on denied guests: Block user from signing in for 30 days, then remove user from tenant.

    • Business Outcome 5: Modernize network security to protect users, apps, and resources

      • Microsoft Entra Internet Access - An identity-centric secure web gateway (SWG)

        • Improve end-user experience and boost user productivity with best-in-class availability, and performance. Eliminate extra hops to optimize traffic routing to Microsoft 365 services.

          • Restore source IP context for all Entra ID risk assessments - User Risk and Sign-In Risks.

          • Restore source IP context for all Entra ID activity logs.

          • Maintain backward compatibility for Source IP based location checks in Conditional Access

          • Maintain backward compatibility for source IP Continuous Access Evaluation (CAE) location checks in Microsoft Applications (DataPath - in Public Preview)

        • Prevent token theft/replay attacks across the authentication plane by extending Compliant Network check through Conditional Access.

          • Verify device or network compliance for your tenant through Compliant Network check integrated in Conditional Access

          • Avoid source IP manageability overhead.

          • Instantly revoke stolen access tokens and cookies with continuous access evaluation integration for Microsoft apps (in Public Preview)

        • Protect against data exfiltration from unauthorized foreign tenants by enabling Universal Tenant Restriction controls across all managed devices and network branches agnostic of OS and browser platform.

          • Protect against data exfiltration by unauthorized foreign identities to foreign tenants

          • Enable universal tenant restriction across all managed devices and network (branch) agnostic of operating system and browser platform.

          • Built-In support for cross-tenant access monitoring - monitor cross-tenant access before enforcing policies.

          • Eliminate need for enterprise managed network proxies and break and inspect for Microsoft traffic.

          • Protect against anonymous access and token infiltration attacks with DataPath coverage for Microsoft Apps (in Public Preview)

        • Configure functions such as:

          • Web Content Filtering

          • Traffic Forwarding

          • Conditional Access

        • In Summary

          • Microsoft Entra Internet Access:

            • Monitor M365 and broader internet traffic to attain visibility and control

            • Prevent risk of malicious access through compromised M365 external tenants using Tenant Restrictions.

            • Secure and Govern internet access using context-aware adaptive access policies linked to user, device, and network context.

    • Business Outcome 6: Reduce risk with visual verification for high-impact scenarios

      • Improving onboarding with verifiable credentials - Microsoft Entra Verified ID with entitlement management

        • Reduce need for self-attestation by new employees or business partners. Users requesting access will be able to obtain identity attributes from a wide set of issuers

        • Simplifies approval processes, as approvers do not need to personally vet requestor's authenticity of claims

        • Simplifies compliance posture with increased consistency and reduced need for manual intervention.


Microsoft Defender XDR: The solution to modern cyberattacks

Speaker

  • Kim Kischel - Director of Product Marketing, Cybersecurity

  • Scott Woodgate - Senior Director, Microsoft Security Business

Key Notes

  • Defending against cybercrimes has never been harder...

    • 130% increase in ransomware attacks

    • 80 security tools for an average-sized organization

    • 2 in 5 security leaders feel they're at risk due to cybersecurity staff shortage.

  • Survey: What's the biggest challenge your organization faces?

    • 51% - Understaffed/skills gap

    • 23% - Too many tools/platforms

    • 15% - Response time to attacks

    • 11% - Too many alerts/processes

  • What is XDR?

    • Extended Detection and Response platforms are designed to deliver a holistic, simplified approach to protect organizations against advanced attacks with a complete view of the kill chain for more effective investigation and response across multiple domains using vast sets of intelligence and built-in artificial intelligence (AI).
  • Microsoft Defender XDR - Building a Unified Defense

    • Prevent

      • Reduce attack surface with threat-based configuration recommendations and built-in vulnerability management.
    • Protect

      • Automatically contain and remediate compromised assets.
    • Detect and Respond

      • Use incident response to respond to cross-workload threats from a single portal

      • Speed up response with an experience designed for SOC efficiency.

    • Extend

      • Unified APIs and connectors
    • Enable Rapid Response with XDR-Prioritized Incidents

      • Remediate threats quickly with a complete view of the kill chain, and prioritize investigation and response at the incident level.
    • Disrupt Advanced Attacks at Machine Speed

      • Stop lateral movement of advanced attacks with advanced AI capabilities that automatically isolate compromised devices and user accounts.
    • Transform SOC productivity with Security Copilot

      • Respond to cyberthreats faster with step-by-step guidance, empower any analyst to build queries in natural language, and reverse-engineer adversarial scripts in seconds.
    • Unify Security and Identity access management

      • Protect your hybrid identities and identity infrastructure from credential threats and other threats with seamless integration of Microsoft Entra ID and XDR.
    • Attack Disruption

      • Detect / Classification / Attack Disruption

        • Only triggers on a very high degree of confidence

        • AI and ML model determines the threat, intention, and tactics.

        • Stops an attack during its process (not after the attack has occurred)

        • Attacks are disrupted, but the cleanup tasks would need to be completed by SOC (re-image devices, unblock users etc.)

  • Microsoft Security Copilot

    • Investigate and respond to threats in a guided experience

      • Summarize an incident and analyze the impact

      • Provide guided recommendations

      • Generate post-event reports in seconds

    • Upskill security talent

      • Run queries using natural language

      • Analyze complex scripts

      • Reverse engineer malware in real-time

    • Assess risks with AI-driven threat intelligence

      • Inquire in natural language about emerging threats

      • Generate contextualized, summarized insights for rapid response

  • Takeaways

    • Microsoft Defender XDR consolidates isolated tools into one consolidated platform to tackle even the most advanced attacks

    • An XDR needs to seamlessly connect information for both the security and identity admin teams

    • AI is set to change the game for security teams.

    • Automation is a key component of XDR and attack disruption is a life saver.


Boost Developer Productivity with AI

Speaker

  • Tricia Read - Azure Digital & Application Innovation Specialist Manager

  • Amanda Tan - Developer Productivity Specialist, Global Black Belt

  • Michelle Sandford - Developer Engagement Lead

Key Notes

  • Developers determine speed of innovation

  • Software development is changing

    • More Complexity -> >1000 Unique services in the Cloud-Native ecosystem

    • More Risk -> 245,000 Malicious packages discovered, 2x all previous years combined

    • More Collaboration -> 36% of time typical developers spend in meetings, answering emails, and other collaboration activities.

  • "Turbocharge developer productivity" - The Microsoft developer platform

    • Developer Compute - Dev Box (with Visual Studio)

    • Engineering Platform - GitHub

    • Development Environments - Azure

  • AI helps across the entire software development lifecycle

    • Build Stages:

      • Code faster with code suggestions

      • Migrate code

    • Test Phase:

      • Faster bug finding and fixing

      • Generate Unit test cases

    • Deployment Phase:

      • Sys Admin Scripting

      • Code to Doc, Doc to Code

  • Microsoft Dev Box - Gives developers self-service access to high-performance, cloud-based workstations that are preconfigured and ready-to-code

    • Ready to Code

    • Flexible but Controlled

    • Managed and Secure

  • Azure Deployment Environments - Reduce cycle times and accelerate delivery

    • Minimize configuration effort

    • Secure with confidence

    • Standardize through templates

      • Results within Microsoft:

        • 20,000 Microsoft Dev's empowered with Dev Box

        • Reduce workstation setup time to one hour or less

        • Reduce time-to-build by up to 64%

  • GitHub Platform

    • A single integrated enterprise-ready platform

    • Industry-best collaborative tools for developers

    • Security at every step of the workflow

    • Powered by AI

    • GitHub Enterprise Cloud - Enabling open-source culture and best practices in your organization in the cloud:

      • Increase collaboration and foster inner source practices

      • Breaking silos

      • Higher developer familiarity and satisfaction

    • GitHub Advanced Security - Securing the software supply chain:

      • Dependency scanning

      • Extensible framework for code scanning

      • Scanning for leaked secrets in repos

  • "Security Built into the Developer Lifecycle"

    • ' Plan > Code > Build > Test > Release > Deploy > Operate > Monitor > '
  • Microsoft's comprehensive solution

    • GitHub Advanced Security - Developer-first Tooling

    • Azure Container Registry - Native security capabilities

    • Defender for Cloud - Automation

  • "Take the next AppSec steps with Azure Innovate" - Leverage Microsoft funding and investment programs, partners and technical experts through the end-to-end journey

    • Envision Workshop - Workshop with Microsoft and your Security, Compliance and Engineering Teams to understand solutions unique to your organization.

    • Proof of Concept - Put your security vision into action with a technical pilot.

    • Move to Production - Leverage implementation and technical resources to move from pilot to production, and upskill your team in new processes.

"Take advantage of extensive Azure resources"

  • Offering: Azure Innovate - Take advantage of money-saving offers to help offset your Developer Productivity project costs

  • Partners: Advanced Specialization - Certified Partners with specialization in Apps, DevOps, Security, Data, and AI.

  • Guidance: Reference Architectures - Leverage enterprise-grade best practices from Developer Productivity Solutions.

  • Skilling: Microsoft Learn - Self-paced training and docs on Developer Productivity.

  • Thought Leadership: eBook - 6 Tips to integrate Security into Your DevOps practices.


Accelerate business growth with AI applications on Azure

Speaker

  • Peachy Hongsuwong - App Innovation Specialist for Retail Commercial

  • Scott Holden - Principal Solutions Specialist, Global Black Belt, App Innovation

Key Notes

  • "Every app will be reinvented with AI"

  • "New apps will be built that weren't possible before"

  • Generative AI makes apps truly intelligent

    • Modern Apps:

      • Modern app development principles

      • Microservices-based architecture

      • Rapid innovation with CI/CD

    • Intelligent Apps:

      • Natural Language interaction

      • Data-driven, personalized experiences that improve over time

      • Enhances and streamlines automation

  • Build Transformational Intelligent Apps with Azure

    • Developer Tools:

      • Visual Studio

      • GitHub

      • Power Platform

    • Azure:

      • App Platform

      • Data & AI for Apps

      • Developer Platform

      • Migration & Modernization

  • Announcing: GitHub Copilot

    • Generally Available - Copilot Chat

    • New - Pull Requests

    • New - Copilot in GitHub Mobile

    • New - Copilot Enterprise

      • 46% of new code is now written by AI

      • 96% of developers are faster with repetitive tasks

      • 75% of developers feel more focused on satisfying work

  • Azure App Platform

    • Azure Application Services:

      • Azure Kubernetes Service

      • Azure Container Apps

      • Azure App Service

      • Azure Spring Apps

      • Azure Functions

      • Logic Apps

    • Announcing: Azure Kubernetes Service

      • Generally Available - Kubernetes Fleet Manager

        • Kubernetes Fleet - Multi-Cluster Update
      • New - Cost Management

      • New - Kubernetes AI Toolchain Operator

        • Announcing: AI Toolchain Operator add-on for AKS

          • Workspace and Infrastructure setup to model inferencing, in a matter of minutes.
    • Public Preview - Node Auto Provision

      • Deploy the right Infrastructure for your workloads and effectively bin pack your applications to reduce running costs

      • Built on the Open Source Karpenter project, with the AKS provider also being made openly available.

    • Public Preview - Artifact Streaming

      • Connect your AKS cluster to ACR.

      • When you deploy on AKS, Microsoft only pulls the necessary layers for initial pod startup, reducing the time it takes to pull images and deploy workloads.

        • Reduce pod startup time for large images by an estimated 15% or more
    • Azure Container Apps for Intelligent Apps

      • New - GPU-Enabled Workload Profiles (Preview)

        • Combine GPU with Serverless jobs and container apps
      • New - Vector DB Add-On (Preview)

        • Training/Inference and custom business logic on one platform
      • New - Easy Code Onboarding (Preview)

        • No Docker or container knowledge required.
    • Build Intelligent Apps with Azure Functions

      • Chatbots / AI Powered Assistants

      • BYO Data for RAG

      • Build Actions / Functions for OpenAI

      • Parse data for model training

    • Early Access Preview - Flex Consumption Plan

      • Flexibility of Scale - Scale and throughput on your own terms with instance size choice, concurrency control, and fast and large scale out.

      • Private Networking - Reach VNet secure services and secure your Function Apps behind Virtual Networks.

      • Serverless - Only pay while there's function executions or for optional always ready instances, with no Maximum function execution time.

    • General Availability - Azure Chaos Studio: A fully managed platform for discovering, experimenting, and orchestrating chaos testing by deliberately introducing faults that simulate real-world outages

      • New - Experiment Templates

        • Get started quickly with common experiment design
      • New - Load Testing Faults

        • Start and stop Azure Load Testing from within your experiment
      • New - Dynamic Targets

        • Use KQL to dynamically select targets at runtime
  • Data & AI for Apps

    • Generally Available - Azure Cosmos DB vector search

      • Unlocking next-generation vector search for any application
    • Generally Available - Vector Search in Azure AI Search

      • Revolutionary Information retrieval for GenAI applications
    • Announcing - Latest Azure Open AI Models

      • Preview - GPT-4 Turbo

      • Preview - DALL-E-3

      • Preview - GPT-4 Turbo with Vision

    • Announcing - Model as a Service with Azure AI

      • Meta's Llama 2

      • Mistral's Premium Models

      • G42's Jais

      • Cohere's Command

      • Ready to use APIs

      • Hosted Finetuning

      • Integrated with leading LLM tools

    • Announcing Azure AI Content Safety

      • New Severity Levels and Enhanced Customer Controls

      • Jailbreak Attempt Detection

      • Protected Materials Detection

  • Developer Platform

    • Preview - Microsoft Copilot for Azure

      • Generate deep insights instantly - Find personalized solutions for your workload with an AI assistant that knows your environment

      • Discover new cloud functionality - Ask Copilot questions using Natural Language to discover and utilize the full functionality of Azure services.

      • Do complex tasks faster - Optimize processes, resources, and workloads with AI orchestration and analytics

    • Public Preview - Dev Box-compatible images with Docker Desktop

    • Private Preview - Config-as-code Dev Box Customizations

      • Developers can directly create devbox.yaml files that specify additional configuration on top of a VM base image.

      • IT and Dev Infrastructure teams can curate the software and settings that Developers can use.

    • Generally Available - Dev Box Managed Networks

    • Public Preview - Azure Deployment Environments integration with Azure Developer CLI

      • Deploy environments from the Azure Developer CLI using Azure Deployment Environment templates
    • Private Preview - Bicep IaC Templates

      • Platform engineers and dev leads can now use Bicep in Azure Deployment Environments

      • Sign Up for the Private Preview: aka.ms/ade-bicep-signup

  • Migration & Modernization

    • Cloud Journey:

      • Pressing Priorities - Managing rising costs, maintain security and compliance, control IT sprawl

      • Be AI-ready - Embrace responsible, secure AI and Cloud-Native technologies.

    • Migrate, Operate, Optimize

      • Simplify your migration journey with tooling for developers to stay productive

      • Let the platform manage operational complexity so you can focus on value

      • Run your production workloads with security and resiliency in mind

    • Announced July 2023 - Azure Migrate and Modernize & Azure Innovate: Offers spanning Migration to Innovation in one place

      • Comprehensive resources in one place

      • Direct access to experts and funding

      • Extensive coverage - from migration to innovation

      • Learn More: aka.ms/AzureHeroOfferings