<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Salmankhan</title>
    <description>The latest articles on DEV Community by Salmankhan (@salman_khan_c31307505285e).</description>
    <link>https://dev.to/salman_khan_c31307505285e</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2320556%2F7127f78f-821b-40b5-b48b-4ae7c1dc56e9.jpg</url>
      <title>DEV Community: Salmankhan</title>
      <link>https://dev.to/salman_khan_c31307505285e</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/salman_khan_c31307505285e"/>
    <language>en</language>
    <item>
      <title>Vulnerability Assessment</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Sat, 28 Jun 2025 20:49:38 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/vulnerability-assessment-14fl</link>
      <guid>https://dev.to/salman_khan_c31307505285e/vulnerability-assessment-14fl</guid>
      <description>&lt;h2&gt;
  
  
  🔒 Vulnerability Assessment – A Crucial Pillar in Modern Cybersecurity 🔍
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Hey'll, 👋&lt;br&gt;
I'm Salmankhan, with over 9 years of experience in the IT domain, specializing in Cloud Infrastructure and Security across AWS and Azure platforms.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;One of the most vital yet often underestimated practices in the security lifecycle is the Vulnerability Assessment. In today’s threat landscape, it's not just about protecting assets—it's about proactively identifying where your defenses might fail.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Here’s a quick insight:&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;🧠 &lt;strong&gt;What is Vulnerability Assessment?&lt;/strong&gt;&lt;br&gt;
It’s the process of identifying, classifying, prioritizing, and addressing security vulnerabilities in systems, applications, networks, and databases.&lt;/p&gt;

&lt;p&gt;💡 &lt;strong&gt;Why it matters:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Finds misconfigurations and insecure default settings&lt;/p&gt;

&lt;p&gt;Flags SQL Injection, XSS, and privilege escalation risks&lt;/p&gt;

&lt;p&gt;Assesses your risk exposure and helps build a remediation roadmap&lt;/p&gt;

&lt;p&gt;Supports DevSecOps culture by embedding security into every stage&lt;/p&gt;

&lt;p&gt;🔍 &lt;strong&gt;Common Assessment Types:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Network Scans (wired/wireless threat detection)&lt;/p&gt;

&lt;p&gt;Host-Based Scans (server/workstation-level insights)&lt;/p&gt;

&lt;p&gt;Application Scans (web app flaws and misconfigurations)&lt;/p&gt;

&lt;p&gt;Database Scans (insecure setups, rogue instances)&lt;/p&gt;

&lt;p&gt;Wireless Scans (rogue APs and signal interception risks)&lt;/p&gt;

&lt;p&gt;🛠️ &lt;strong&gt;Tools That Help:&lt;/strong&gt;&lt;br&gt;
All purpose vulnerability scanners:&lt;br&gt;
Qualis, Rapid7, Tenable Nessus&lt;/p&gt;

&lt;p&gt;✅ &lt;strong&gt;Key Takeaway:&lt;/strong&gt;&lt;br&gt;
Security isn’t a one-time job. Vulnerability assessments must be continuous, collaborative, and ingrained in every IT operation.&lt;/p&gt;

&lt;h1&gt;
  
  
  CyberSecurity #CloudSecurity #AWS #Azure #VulnerabilityAssessment #InfoSec #ITSecurity #SecurityInsights #SRE #CloudInfra
&lt;/h1&gt;

</description>
      <category>vulnerabilities</category>
      <category>security</category>
      <category>azure</category>
    </item>
    <item>
      <title>Service VS Private Endpoint</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Tue, 24 Dec 2024 16:23:42 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/service-vs-private-endpoint-cm3</link>
      <guid>https://dev.to/salman_khan_c31307505285e/service-vs-private-endpoint-cm3</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;In Multi-tenant environment, For PAAS azure services access over internet was not restricted or you were not able&lt;br&gt;
to restrict access to just your resources. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;To overcome this challenge restriction was very complex with multi-tenant service. At the beginning only way was to use single tenant environment or running services in VM instead of using PAAS. This public access was concern so Microsoft implemented new services that allow you to limit access on multi-tenant environment. &lt;/p&gt;

&lt;p&gt;Today we will discuss those solutions. It's kind of similar; Service Endpoint and Private Endpoint. Both are designed to allow restriction on your services to access, who can connect you services and how they do it. Sometimes it's confusing which service to use. Therefore, we'll see these services and try to make clear decision. &lt;/p&gt;

&lt;h2&gt;
  
  
  Service Endpoint
&lt;/h2&gt;

&lt;p&gt;Service Endpoint allow you to restrict access to your PAAS resources to traffic coming from your Azure VNET. With Service Endpoint, PAAS service is still separate to your VNET, and traffic is leaving your virtual network access the PAAS Service. However, PAAS service is configured to be able to identify traffic coming from VNET and allow that without configuring public IP on your VNET.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faq4ci13nrapa3fz5d0s1.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Faq4ci13nrapa3fz5d0s1.PNG" alt="Service Endpoint" width="566" height="468"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Service Endpoint work by enabling a subnet on your VNET to support Service Endpoint. Afterwards, you can configure your PAAS resource to only accept traffic from those subnets. No need for IP filtering or NAT; you can tell PAAS resource which NET and subnet to allow traffic. When service endpoint enabled PAAS resource sees traffic coming from VNET's private IP not it's public IP. &lt;br&gt;
Another advantage of using service endpoint is that traffic is routed to azure resources. Service Endpoint means traffic is &lt;br&gt;
sent directly to the Azure resource.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Service Endpoint Supported by below services;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure Storage&lt;/li&gt;
&lt;li&gt;Azure SQL Database &lt;/li&gt;
&lt;li&gt;Azure Synapse Analytics &lt;/li&gt;
&lt;li&gt;Azure Database for PostgreSQL Server&lt;/li&gt;
&lt;li&gt;Azure Database for MySQL Server&lt;/li&gt;
&lt;li&gt;Azure Key Vault &lt;/li&gt;
&lt;li&gt;Azure Cosmos DB&lt;/li&gt;
&lt;li&gt;Azure App Service &lt;/li&gt;
&lt;li&gt;Azure Event Hubs &lt;/li&gt;
&lt;li&gt;Azure Service Bus &lt;/li&gt;
&lt;li&gt;Azure Cognitive Services &lt;/li&gt;
&lt;li&gt;Azure Container Registry &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Limitation&lt;/strong&gt;&lt;br&gt;
Service Endpoint can not be used by traffic originating on-premises, through VPN or Express Route, Only traffic allowed &lt;br&gt;
from your Azure VNET. If you want to allow your on-prem resources to access then you need to whitelist their public IP.&lt;/p&gt;

&lt;h2&gt;
  
  
  Private Endpoint
&lt;/h2&gt;

&lt;p&gt;Private Link is newer solution than service endpoint. The key difference between private endpoint and service endpoint is that Multi-tenant PAAS resource into VNET. With private endpoint the PAAS resource will be within your VNET and gets private IP on your VNET. When traffic will be sent to PAAS resource, it does not leave VNET. &lt;br&gt;
When you use private endpoints, traffic is secured to private endpoint resource. The platform validates network connections, allowing only those that reach the specified private-endpoint resource. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs4se3m403rsyf8g3r550.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fs4se3m403rsyf8g3r550.PNG" alt="Private Endpoint" width="580" height="393"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;In case of Azure Storage, you would need separate private endpoint to access file and blob. Private Endpoint pairs your internal services or application with standard load balancer that allow access from parties outside your network. &lt;br&gt;
Access is restricted via RBAC or subscription. Client can create private endpoint and request access to private endpoint service via approval process. By doing this business can utilize private network components without trouble or security considerations of maintaining VPN connectivity or peering to consumer of their application. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;DNS configuration for Private Endpoint&lt;/strong&gt;&lt;br&gt;
DNS setting that you use to connect to private endpoint also important. Existing Azure services already have DNS configuration you can use when you're connecting over public endpoint. To connect same service over private endpoint, separate DNS Settings, often configured via private DNS zones. While using FQDN ensure your DNS settings are correct. &lt;br&gt;
The network interface associated with private endpoint contains the information that's required to configure your DNS. &lt;br&gt;
The information includes FQDN and private IP Address for private endpoint resource. &lt;br&gt;
&lt;a href="https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns" rel="noopener noreferrer"&gt;https://docs.microsoft.com/en-us/azure/private-link/private-endpoint-dns&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbbrku7aj3smt7h8a02ka.PNG" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fbbrku7aj3smt7h8a02ka.PNG" alt="DNS Cnfiguration" width="537" height="145"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Another key difference with private endpoint is that when enabled, you are granting access to a specific PAAS resource in your VNET. That means you can control egress to PAAS resources. Another scenario, you can use NSG to block access to all Azure SQL DB and then use private endpoint to grant access only to your specific Azure SQL Server. &lt;/p&gt;

&lt;p&gt;Unlike Service Endpoint, Private Endpoint allows access from resources on your on-prem network through VPN or ExpressRoute from peered networks. You can also connect to resources across region. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Private Endpoint Support below services;&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Azure Storage&lt;/li&gt;
&lt;li&gt;Azure Data Lake Storage Gen 2 &lt;/li&gt;
&lt;li&gt;Azure SQL&lt;/li&gt;
&lt;li&gt;Azure Synapse &lt;/li&gt;
&lt;li&gt;Azure Key Vault &lt;/li&gt;
&lt;li&gt;Azure Kubernetes Services &lt;/li&gt;
&lt;li&gt;Azure Virtual Desktop &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Limitation&lt;/strong&gt;&lt;br&gt;
If there is an integration of Azure Private DNS then its problematic or do not need to use Azure Private DNS with your VNET. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Benefit of Private Endpoint&lt;/strong&gt;&lt;br&gt;
Benefit of the Azure Private Link is that it eliminates a huge hurdle for some organizations that are bound by compliance or governance requirements that traffic is privately secured throughout the organization. Now those organizations can connect to private endpoints via site-to-site VPN or ExpressRoute.&lt;/p&gt;

&lt;p&gt;Extending internal resources to other departments or customers is another key benefit of Private Endpoint. Using Private Endpoint in parallel with Azure Standard Load Balancer enables you to make internal PaaS or IaaS services available via Private Endpoint to business units or external customers without allowing traffic to or from the Internet.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Pricing&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Private endpoint service, which is consistent at around $0.01/hour for most of the regions.&lt;/li&gt;
&lt;li&gt;Inbound data processed, will vary based on the ingress data that your private endpoint is receiving.&lt;/li&gt;
&lt;li&gt;Outbound data processed, will also vary based on the egress data that your private endpoint is sending.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Which to pick?&lt;/strong&gt;&lt;br&gt;
First, Look at resources you want to access and see which service it is supported by. Some services will only be supported in one or the other and so it's your choice. &lt;/p&gt;

&lt;p&gt;Assuming you can use either option for your service then decision will come down to complexity. Service Endpoint is more easy to set up than private endpoint. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Conclusion&lt;/strong&gt;&lt;br&gt;
If you only need a secure connection between the virtual network and another resource, you should use a service endpoint, which means your resources will still have public exposure and you will be accessing those resources using the public endpoint of the resource.&lt;/p&gt;

&lt;p&gt;However, if you need to access your azure resources from on-premises through an Azure gateway, a regionally peered virtual network, or a globally peered virtual network, use a private endpoint. The private endpoint will allow connection using the private IP of the resources, eliminating the public exposure completely.&lt;/p&gt;

</description>
      <category>azure</category>
      <category>network</category>
      <category>connectivity</category>
      <category>microsoft</category>
    </item>
    <item>
      <title>Load Balancer</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Mon, 16 Dec 2024 22:51:38 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/load-balancer-4lmm</link>
      <guid>https://dev.to/salman_khan_c31307505285e/load-balancer-4lmm</guid>
      <description>&lt;p&gt;&lt;strong&gt;Efficient Traffic Distributor to your Cloud Resources&lt;/strong&gt;&lt;br&gt;
Load balancing often refers to the process of efficiently distributing incoming network traffic across a group of backend  servers or resources. In cloud computing, Azure Load Balancer plays a pivotal role in ensuring that your application remain available to perform under heavy load.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Azure Load Balancer Overview&lt;/strong&gt;&lt;br&gt;
Azure Load Balancer operates at layer 4 of the OSI model, making it a highly efficient and effective tool for managing traffic. It serves as single point of contact for client, it distributes inbound flow arriving at load balancers frontend and backend pool. These instances can be Azure VM or VMSS. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Public Load Balancer&lt;/strong&gt;&lt;br&gt;
A public load balancer offers both inbound and outbound connectivity for the VMs within your virtual network:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Inbound Traffic: Azure Load Balancer distributes internet traffic to your VMs, ensuring they handle requests efficiently and without overloading any single VM.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Outbound Traffic: It translates the private IP addresses of your VMs to public IP addresses for any outbound connections originating from your VMs.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Internal (Private) Load Balancer&lt;/strong&gt;&lt;br&gt;
An internal load balancer, also known as a private load balancer, provides inbound connectivity to VMs in scenarios requiring private network connectivity:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;Hybrid Scenarios: It allows access to the load balancer's frontend from an on-premises network, making it ideal for hybrid cloud architectures.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Intra-Virtual Network Traffic: Internal load balancers are used to load balance traffic within a virtual network, ensuring even distribution among internal resources.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Key Benefits&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;High Availability: By distributing traffic across multiple instances, Azure Load Balancer enhances the availability of your applications.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Scalability: It supports the scalability of your applications by efficiently managing increased traffic loads.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Health Monitoring: The integrated health probes ensure that only healthy instances receive traffic, improving reliability.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Security: It provides robust security features by managing traffic flow and protecting backend resources.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;blockquote&gt;
&lt;p&gt;Conclusion Azure Load Balancer is an essential component for any organization looking to optimize the performance and availability of their applications in the cloud. Whether you need to balance internet traffic or manage internal network traffic, Azure Load Balancer offers the flexibility and features necessary to meet your needs.&lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>azure</category>
      <category>network</category>
      <category>connectivity</category>
    </item>
    <item>
      <title>Landing zone?</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Mon, 09 Dec 2024 22:00:30 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/landing-zone-4p89</link>
      <guid>https://dev.to/salman_khan_c31307505285e/landing-zone-4p89</guid>
      <description>&lt;h2&gt;
  
  
  Azure Landing Zone
&lt;/h2&gt;

&lt;p&gt;There are 3 Microsoft foundation Azure architect sites which can assist you with your cloud governance, infrastructure, business management, applications, security and lot more. &lt;br&gt;
It's best practice where you can land your application. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;What is landing zone?&lt;/strong&gt;&lt;br&gt;
Basically whenever your client is ready to migrate from on premises to cloud platform at that time you should have some reference guide or framework in which you can fit your clients overall requirements whether it may be cost optimization, security, performance, monitoring anything. &lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;So Cloud Architectural Framework is collection of guidance and best practices. &lt;/li&gt;
&lt;li&gt;It helps you in cloud adoption journey &lt;/li&gt;
&lt;li&gt;CAF is lifecycle that Microsoft presents again with goal of helping you avoid pitfall in terms of cloud adoption. &lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;*&lt;em&gt;Pillars of landing zones in CAF *&lt;/em&gt;&lt;br&gt;
Strategy &lt;br&gt;
Plan &lt;br&gt;
Ready &lt;br&gt;
Migrate &lt;br&gt;
Innovate &lt;br&gt;
Secure &lt;br&gt;
Manage &lt;br&gt;
Govern &lt;br&gt;
Organize &lt;/p&gt;

&lt;p&gt;From above ready phase Cloud Adoption Framework of Azure the landing zone hosts Workload you plan to built in or migrate to cloud. It's not always necessary to follow all of the guidelines cause sometimes you have to go with proven practices.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Types of Landing Zones&lt;/strong&gt;&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Platform Landing Zone - Framing of your solution&lt;/li&gt;
&lt;li&gt;Application Landing Zone - application or Workload related landing zone &lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;You don't have to adopt them cause plenty of them are going to create lot more resources which you're not be using all the time. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6slelizmvotec36q124r.jpeg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F6slelizmvotec36q124r.jpeg" alt="Azure Landing Zone" width="756" height="406"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Above diagram will give you reference for different landing zones. &lt;/p&gt;

&lt;p&gt;What's wonderful about landing zone is that Microsoft is prioritizing them so work is going on they are being developed and lot many templates. &lt;br&gt;
Different Landing Zone for hybrid cloud are given on git hub you can not follow all of these deployments cause some of them are way too complicated. &lt;/p&gt;

&lt;p&gt;Idea is not only we can automate these template but also using all this to start our deployment from Landing zone architecture. We should bring more proven practices. &lt;/p&gt;

&lt;p&gt;&lt;code&gt;There is another framework&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Azure Well Architecture Framework(WAF)&lt;/strong&gt;&lt;br&gt;
These are pillars that drive architectural excellence at fundamental level of Workload. &lt;br&gt;
CAF design your overall strategy. &lt;br&gt;
WAF is where you get into Workload. &lt;/p&gt;

&lt;p&gt;&lt;strong&gt;WAF pillars&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Realiability&lt;/li&gt;
&lt;li&gt;Security &lt;/li&gt;
&lt;li&gt;Cost Optimization &lt;/li&gt;
&lt;li&gt;Operational Excellence &lt;/li&gt;
&lt;li&gt;Performance Efficiency&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;Third framework is&lt;/code&gt;&lt;br&gt;
&lt;strong&gt;Azure Architecture Center&lt;/strong&gt;&lt;br&gt;
This is center piece of Azure architecture with reference. What you have here is opportunity to combine our best practices of CAF and WAF Landing Zone. &lt;br&gt;
In this framework you can search for references which has already been deployed or developed by proven practices. &lt;br&gt;
&lt;em&gt;Exa. Go for azure openai architecture in landing zone&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;You can have Azure Landing Zone for tenant deployment, openai reference. &lt;br&gt;
If you're deploying Azure Landing Zone template from github best go for the creator who has created this, in right panel check activities. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;I think best practices are good but I would like to chose proven practices here. &lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>azure</category>
      <category>cloud</category>
      <category>landingzone</category>
      <category>architecture</category>
    </item>
    <item>
      <title>Sentinel Overview</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Mon, 02 Dec 2024 21:48:03 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/sentinel-overview-4g3j</link>
      <guid>https://dev.to/salman_khan_c31307505285e/sentinel-overview-4g3j</guid>
      <description>&lt;h2&gt;
  
  
  Azure Sentinel Overview
&lt;/h2&gt;

&lt;p&gt;Azure Sentinel is a security information event management(SIEM) &amp;amp; security orchestration automated response(SOAR) solution. It's very advanced centralized security monitoring and response solution. You're going to monitor data from M365, other cloud providers(AWS, GCP, IBM), Azure resources, Defender, on-Prem resources like f5 or Cisco. Gather report on these and analysis. Azure Sentinel help you with you this. Ability to detect, investigate and respond with azure Sentinel give advantage here.&lt;/p&gt;

&lt;p&gt;!(&lt;a href="https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tgcxfyutm71j1s3rwbk0.jpeg" rel="noopener noreferrer"&gt;https://dev-to-uploads.s3.amazonaws.com/uploads/articles/tgcxfyutm71j1s3rwbk0.jpeg&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;It's taking of taking azure security center to next level with additional capabilities like investigate and response capability. &lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Sentinel Configuration
&lt;/h2&gt;

&lt;p&gt;*&lt;em&gt;How does it work? *&lt;/em&gt;&lt;br&gt;
It's all unnderpinned log analytics workspace. We know what log analytics workspace do. We know that they can help us to ingest data, store data and got all query language and visualization capability built on top. &lt;br&gt;
Azure Sentinel is built on top of this log analytics workspace. &lt;br&gt;
When you create Azure Sentinel you are just enabling log analytics workspace for Azure Sentinel. &lt;br&gt;
Now we use data connectors to retrieve data and these are created by various providers for variety of data types. &lt;/p&gt;

&lt;p&gt;!(&lt;a href="https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9b13otd6kvuohu1q5r8m.jpeg" rel="noopener noreferrer"&gt;https://dev-to-uploads.s3.amazonaws.com/uploads/articles/9b13otd6kvuohu1q5r8m.jpeg&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;Now Sentinels power is in what we going to do with data. Example - analytics, workbooks, hunting, automation etc. &lt;/p&gt;

&lt;h2&gt;
  
  
  Azure Sentinel alerts and incidents
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;how does this work&lt;/strong&gt;&lt;br&gt;
We have log analytics workspace as base where all data is going to be and that data is going to be analyzed and alert will be created on that data. &lt;br&gt;
You are going to analyze data like you're going to looking for failed login attempt to Azure portal or maybe failed RDP attempt to your VM, some storage account key mishaps with multiple storage account in your environment to detect this were going to analyze our data. &lt;br&gt;
So to create alert Microsoft provides several pre-built rule templates that you can use to identify security issues. &lt;br&gt;
When rules become active they perform analysis and generate some alerts. &lt;br&gt;
And when we generate an alert we get incidents that we can go and manage within Azure Sentinel portal. &lt;/p&gt;

&lt;p&gt;!(&lt;a href="https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4w6ytvbh1gu3cgo9nmyq.png" rel="noopener noreferrer"&gt;https://dev-to-uploads.s3.amazonaws.com/uploads/articles/4w6ytvbh1gu3cgo9nmyq.png&lt;/a&gt;)&lt;/p&gt;

&lt;p&gt;So we have got incident management within Azure Sentinel. &lt;/p&gt;

</description>
      <category>azure</category>
      <category>sentinel</category>
      <category>cloud</category>
      <category>security</category>
    </item>
    <item>
      <title>Security Management and Advanced Threat Protection</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Mon, 25 Nov 2024 21:59:53 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/security-management-and-advanced-threat-protection-3ed6</link>
      <guid>https://dev.to/salman_khan_c31307505285e/security-management-and-advanced-threat-protection-3ed6</guid>
      <description>&lt;h2&gt;
  
  
  Security Management
&lt;/h2&gt;

&lt;p&gt;Cloud is now essential and can say that important factor in every technical aspect. &lt;br&gt;
To protect your cloud vendors have introduced security and as for azure we have Defender for Cloud 💫 &lt;/p&gt;

&lt;p&gt;&lt;em&gt;Defender for Cloud is application made up of security practices design to protect your cloud and its application from cyber threats.&lt;/em&gt;&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Defender for Cloud have three major capabilities-&lt;/p&gt;
&lt;/blockquote&gt;

&lt;ol&gt;
&lt;li&gt;DevSecOps- security management at code level &lt;/li&gt;
&lt;li&gt;CSPM- Cloud Security Posture Management to prevent security breach&lt;/li&gt;
&lt;li&gt;CWPP- Protection for Server, Database, Storage and Workload &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  How you enable this?
&lt;/h2&gt;

&lt;p&gt;Defender for Cloud will fix your security vulnerabilities. It is used for blocking the malicious threats, detect them and respond rapidly when you're under attack. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Enable Security for your Cloud &lt;br&gt;
To enable this in Azure cloud your are going to use Microsoft Defender for Cloud &lt;br&gt;
You can check for subscription and enable it there. &lt;br&gt;
Once you enable Defender for Cloud it integrates with Microsoft Defender Portal no steps needed to take. Integration of Defender for Cloud and XDR brings cloud environment into Microsoft Defender XDR. &lt;br&gt;
&lt;code&gt;New update&lt;/code&gt;&lt;br&gt;
Today feature has updated Defender for storage malware scan for blobs upto 50 GB &lt;/p&gt;

&lt;p&gt;Starting on Dec 31, Defender for storage malware scanning will support upto 50 GB. This feature is under preview previously it was limited for only 2 GB. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Microsoft Security Copilot in Defender for Cloud
&lt;/h2&gt;

&lt;p&gt;Now Defender for Cloud integrated with both Microsoft Security Copilot for Azure. With this integration security question can be asked, receive response trigger analysis summarize using our natural language. &lt;br&gt;
This AI platform will provide you understanding the context and effect of recommendations and addressing misconfiguration in code too. &lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;trying to put thoughts in article and study which might help you who's is reading this article. We rise by lifting others. &lt;/p&gt;
&lt;/blockquote&gt;

</description>
      <category>security</category>
      <category>azure</category>
      <category>cloudcomputing</category>
      <category>cloudskills</category>
    </item>
    <item>
      <title>What is Cloud Workload Security</title>
      <dc:creator>Salmankhan</dc:creator>
      <pubDate>Mon, 18 Nov 2024 23:11:00 +0000</pubDate>
      <link>https://dev.to/salman_khan_c31307505285e/what-is-cloud-workload-security-k01</link>
      <guid>https://dev.to/salman_khan_c31307505285e/what-is-cloud-workload-security-k01</guid>
      <description>&lt;h2&gt;
  
  
  What is Cloud Workload Security?
&lt;/h2&gt;

&lt;blockquote&gt;
&lt;p&gt;Cloud Workload Security refers to the practice of protecting resources, services and applications run on cloud. Virtual Machines, databases, containers considered as Cloud Workloads. &lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Cloud Deployment Models
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Public Cloud - Public multitenant offering like AWS, Azure and GCP. &lt;/li&gt;
&lt;li&gt;Private Cloud - Cloud environment dedicated to single business entity. &lt;/li&gt;
&lt;li&gt;Hybrid Cloud - A combination of on-premises public and private cloud services &lt;/li&gt;
&lt;li&gt;Multi Cloud - A combination of cloud services; which includes multiple types of services hosted on multiple public and private clouds. &lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Cloud Service Types
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;Infrastructure as a Service &lt;/li&gt;
&lt;li&gt;Platform as a Service &lt;/li&gt;
&lt;li&gt;Software as a Service&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  Cloud Workloads are vulnerable to a variety of threats
&lt;/h2&gt;

&lt;p&gt;Cloud resources and Workloads are prone to a wide variety of cyber threats including ransomware, malware, data breach, phishing attacks and DDoS attacks. Cyber attackers can exploit cloud security vulnerabilities using stolen credentials to mount attacks and disrupt services or steal confidential information. &lt;br&gt;
Strong cloud security practices are fundamental to maintain the availability of the business application, safeguarding confidential info. &lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foefeywspg5mfcbaeu4sc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Foefeywspg5mfcbaeu4sc.png" alt="Image description" width="800" height="766"&gt;&lt;/a&gt;&lt;br&gt;
Example of cloud vulnerabilities &lt;/p&gt;

&lt;h2&gt;
  
  
  Cloud Workload Security is shared responsibility between Cloud provider and customer
&lt;/h2&gt;

&lt;p&gt;Cloud security practices are similar to organizations typical IT and Network security practices, but there is a catch. Unlike IT, Cloud Security governed by shared responsibility model like cloud service provider will responsible for infrastructure and customer is responsible for managing security above hypervisor. Please refer below. &lt;br&gt;
&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcweotxqmqslthjh0newe.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fcweotxqmqslthjh0newe.png" alt="Image description" width="727" height="422"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;h2&gt;
  
  
  Best Security Practices for Cloud Customer
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Securing the management console - Cloud providers provide management consoles for administering account, configuring services, troubleshooting problems, monitoring and billing. These are targets of attackers. Organizations can control access to cloud management console to prevent attacks and data leaks. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Securing Infrastructure - Virtual Machines, Storage account, container and other resources are common target for cyber attack. Customer must put strong security system and practices in place to unauthorized access to cloud. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Securing admin account for SAAS application - SAAS includes a management console for administering user and services. These are commonly attacked by hackers. Privileged Identity management can ensure its security and reduce risk. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Securing DevOps console and CI/CD pipeline - Devops teams rely on the tools. Perpetrator often exploit devops admin console and launch attack or data leaks. Customer must track and monitor but source code access based on the policy. &lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Securing Cloud Entitlements - Users or identities leverage cloud IAM permission to access infrastructure and services in their organizations environment. In hands of hackers excessive permission can put sensitive data at risk. PIM and IAM can be used for unauthorized access. &lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

</description>
      <category>security</category>
      <category>cloudskills</category>
      <category>cloudpractitioner</category>
      <category>cloudcomputing</category>
    </item>
  </channel>
</rss>
