Saturday, October 23, 2021

 

This is a continuation of an article that describes operational considerations for hosting solutions on Azure public cloud.

The order in which a conditional access policy is implemented depends on the assignments and access controls. It brings together signals with which it makes decisions and then enforces organizational policies. If there are multiple conditional access policies, they must all apply to grant access. Assignments such as requiring an MFA and a compliant device must be ANDed. Policies are enforced in two phases: 1) session details are collected and 2) policies are enforced. Phase 1 involves gathering session details via connection properties which are also evaluated in report-only mode Phase 2 prompts the user but enforces all the policies.

Azure AD conditional access is frequently used to secure cloud applications with a single policy that grants access for selected users and groups who are required to pass multi-factor authentication. This comes helpful when access is originated from a location that is not trusted.

Networking resources must belong to the same subscription, region and resource group to set up virtual end points.  Microsoft peering must be created to configure ExpressRoute circuit. The provider status is checked to ensure that the circuit is fully provisioned by the connectivity provider.

Azure Monitors provide tremendous insight into operations of Azure Resources. It is always recommended to create multiple application insights resources and usually one per environment. This results in better separation of telemetry,alerts, workitems, configurations and permissions. Limits are spread such as web test count, throttling, data allowance etc and it also helps with cross-resource queries.

Limits should not be configured for the prod environment because it will result in loss of data once the limits are breached. They apply instead to dev and test environments.

When the data does not show in the telemetry, we could check the firewall practice, ikey configurations, user account under which the IIS is running and if it has privileges to access the internet. The Flush method can be called periodically.

Status Monitor tool can be used when the app is instrumented with the .Net 4.6 SDK. It collects basic information about outbound HTTP and SQL calls. Alert should not be configured unnecessarily. They could generate a lot of noise and make it harder to detect those that matter. RBAC controls must be properly set as with all resources.

 

No comments:

Post a Comment