In DevOps processes, security is often forgotten or neglected. Increasingly more companies are recognizing this problem. But this doesn’t have to be a problem as long as you start implementing security in DevOps on time. Lot of features, that DevOps processes use, can be turned to our favor and used to increase security . Join us in this feature-packed session where you will discover DevOps security nuggets, see real world examples and learn to become DevOps security expert!
Within the last couple of years, we have seen that security hygiene is one the main priorities for companies when it comes to protecting their hybrid cloud estate. Governance concepts, as guardrails, are the first step to enhance their security posture; however, establishing these processes is one of the biggest challenges customers are facing nowadays. Visibility into security issues, data customization and an understanding of automation options can help overcome these to proactively work on improving a line of defense. In this session, Fernanda and Tom - Program Managers in Microsoft’s Azure Security Center team - will take you on a journey across their security tool that touches Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP); guide you in automations and help you build your own custom dashboards based on built-in capabilities. You will learn how to leverage Workbooks and Logic Apps, use Workflow Automation and Continuous Export, and find the perfect timing to use the built-in REST APIs.
Azure services like App services, Azure SQL, Azure Files, Azure Key vault, and many more must be brought inside the private Virtual Network. They should only be accessible inside the virtual network. This would prevent public access to these services and help you build corporate intranet applications. There are many ways to achieve this functionality. However, it can be easily achievable using Azure Private Link. In this session, we would explore the concept of Azure Private Link and implement a Private Link for an App Service.
These days we use APIs to expose all our microservices , processes, and data, and all this while working in a PaaS or serverless environment. But how do we ensure this is done in a secure and governed way? This is where Azure API Management comes in, where we can create a repository of all our APIs, and make sure to expose all of these securely in a standardized manner. In this session we will dive into the most common security hazards, and see how API Management helps us solve these. You will learn all about the strengths and weaknesses of the product, best practices, and how to harden the defenses of your services.
Many firms still do not have a clear picture of the position of cyber security within their business processes. For the most part, everything is still based on an ad-hoc approach, and that is the primary problem. If we include in the equation a new bold world that has adopted a remote work concept that will remain the default in the post-COIVD world, then it is high time we put cybersecurity in the place it deserves and must be. Otherwise the consequences will not be pleasant. This lecture will show you an example of a security vertical and horizontal within a company.
"Over the past year, enterprise adoption of low-code software development platforms surged across the world economy as COVID-19’s economic consequences drove an unprecedented number of digital initiatives. Enterprises are turning to low-code platforms to rapidly build new apps that empower customers, remote workers and external end users conducting business operations or pivoting to new opportunities." - devops.com Since Covid-19 hit the world, we see that software delivery should be quicker than before. Low-Code/No-Code platforms becoming pretty popular this day, Can Low-Code/No-Code impact security? Low code does not mean low security. There is a lot of risks that we should care about. If you want to learn more about security concerns in low-code/no-code development came to my session and find out.
Although Microsoft Azure is secure by default, it has many security features and settings. But because of this, it is sometimes very easy not to see the tree from the forest and hard to find a needle in a haystack. In this session, we will focus on and show you top five ways to protect your Azure infrastructure - the five ways and capabilities that have been proven to significantly improve tenant, data and Azure infrastructure security.