Security, Compliance, and Identity Fundamentals for Azure

What is Azure Active Directory?

AAD is Microsoft’s cloud-based identity and access management service.  It is used by organizations to enable their employees, guests, and others to sign in and access the resources they need. There are two such as:

  • Internal resources, such as apps on your corporate network and intranet, and cloud apps developed by your own organization.
  • External services, such as Microsoft Office 365, the Azure portal, and any SaaS applications used by your organization.

Azure AD also allows organizations to securely enable the use of personal devices, such as mobiles and tablets, and enable collaboration with business partners and customers.

Azure AD is available in four editions such as Free, Office 365 Apps, Premium P1, and Premium P2.

Azure Active Directory Free – The free version allows you to administer users and create groups, synchronize with on-premises Active Directory, create basic reports, configure self-service password changes for cloud users, and enable single sign-on across Azure, Microsoft 365, and many popular SaaS apps.

Office 365 Apps – The Office 365 Apps edition allows you to do everything included in the free version, plus self-service password reset for cloud users, and device write-back, which offers two-way synchronization between on-premises directories and Azure AD.

Azure Active Directory Premium P1 – The Premium P1 edition includes all the features in the free and Office 365 apps editions.

Azure Active Directory Premium P2 – The Premium P2 offers all the Premium P1 features, and Azure Active Directory Identity Protection to help provide risk-based Conditional Access to your apps and critical company data.

Four pillars of an identity infrastructure

Source: https://docs.microsoft.com/en-us/learn/paths/describe-concepts-of-security-compliance-identity/

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

What is Operational Technology (OT) Security Monitoring

Introduction

OT is the practice of using hardware or software that is used to control physical processes, devices and infrastructure. It includes systems that are used in manufacturing, energy, medicine, building management, and other industries.

OT monitors and manages industrial processes and manufacturing equipment’s and keep them running.

Components for OT

  • Industrial Control System (ICS)

ICS are the main component of OT that includes different types of devices, systems, controls, and networks that manage a variety of industrial processes.

  • Supervisory Control and Data Acquisition (SCADA)

SCADA is a data collecting system from sensors, often at distributed sites which sends it to a central computer that manages and controls the data.

Challenges for OT security

  • Lack of risk mitigation and remediation
  • Lack of awareness among OT staff
  • Hard to test production environments
  • Limited security awareness
  • Limited patching

How IT is different from OT Network Solution

IT mainly focuses on the user experience, performance of the transmission, ease of operation based on standards. Secondly, IT focuses on integrity, availability of system and confidentiality whereas OT focuses on the safe operation of plants having reliable data transmission for time-critical applications and also controls equipment’s, information technology and controls data.

IT Requirements
OT Requirements

Products of Operational Technology (OT)

Following are the products of OT marketed by different companies:

  • Products In Operational Technology (OT) Security Market by Darktrace
  • Nozomi Networks Guardian by Nozomi Networks
  • Kaspersky Industrial CyberSecurity (KICS) by Kaspersky
  • BOTsink by Attivo Networks
  • Symantec Endpoint Security Symantec Endpoint Security
  • Check Point Advanced Endpoint Threat Detection by Check Point Software Technologies
  • Thales Luna Network HSM by Thales (Gemalto)

Note: The above information has been taken from Gartner website operational technology security, click here

Major OT systems attacks

  • 2017 Petrochemical facilities Middle East
  • 2016 Energy company Europe
  • 2016 Dam attack USA
  • 2015 Power company Ukraine
  • 2014 Steel mill Germany
  • 2010 Nuclear facilities Iran

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Knowledge Management …!!!

Knowledge Management

What is Knowlege Management?

It is the collection of methods relating to creating, sharing, using & managing the information & knowledge within an organization.

It refers to a multidisciplinary approach to achieving organisational objectives by making the best of knowledge.

KM

Types of Knowlege Management

  1. Explicit Knowlege : Knowledge i.e eazy to write down & share
  2. Implicit Knowledge: Applied Knowledge
  3. Tacit Knowledge: Knowledge i.e. gained through personnal experience

Knowledge Management Process

  • Knowledge Creation: It starts with knowledge that may come from many sources, including employees within an organization or outside individuals.
  • Knowledge Storage: The knowledge must then be structured in a knowledge management system for future use. This knowledge must not only be organized, but it also needs to include security features so that knowledge can be accessed by authorized personnel when needed.
  • Knowledge Sharing: The knowledge organization process is completed by knowledge sharing. This knowledge sharing includes everything from knowledge training to knowledge exchange, where knowledge can be acquired or enhanced through knowledge discussions.

Examples of KM: CMS, Wiki, Data Warehouse, DMS etc.

Source: https://www.ibm.com/cloud/learn/knowledge-management

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

News coming from INDIA “No Ban on Crypto but will be regulated”

There are lot of buzz going around on the crypto market, here there is something that many crypto investors were waiting to hear & holding on to their breath.

The Indian panel court are NOT Banning Cryptocurrency, yes you heard it right there is “No Ban on Crypt” but it will be regulated by none other than the SEBI government body.

The Cryptocurrency and Regulation of Official Digital Currency Bill, 2021 brings regulation not ban, industry sources told the Indian Electronic Media.

These are the following 10 points which are the “The Big Story”:

It was learnt on Tuesday that the Centre could bring a Bill in the winter session of Parliament to bar all cryptocurrencies in India, barring a few exceptions, and create a framework to regulate digital currency issued by the Reserve Bank of India (RBI).

In response, all major digital currencies saw a fall of around 15 per cent and more, with Bitcoin down by around 18.53 per cent, Ethereum fell by 15.58 per cent, and Tether down by 18.29 per cent.

But as the news of regulation, not ban, came out, markets seem to be stabilising.

India’s has had a hot-cold relationship with crypto. The RBI had banned it in 2018 voicing “serious concerns” about private cryptocurrencies.

Then the Supreme Court of India had lifted the ban in 2020 and now in 2021 negotiations are on between industry stakeholders and the Centre to bring in a regulation that will put corrupt practices to check.

According to Blockchain and Crypto Assets Council, India holds about ₹ 6 lakh crore in crypto assets.

Last week, the Standing Committee on Finance, chaired by BJP member Jayant Sinha, met the representatives of crypto exchanges, blockchain and Crypto Assets Council (BACC), among others, and arrived at a conclusion that cryptocurrencies should not be banned, but it should be regulated.

Delivering a keynote address at the Sydney Dialogue on November 18, Prime Minister Narendra Modi had urged all countries to ensure that cryptocurrency does not “end up in the wrong hands”.

Private digital currencies have gained popularity in the past decade or so. However, regulators and governments have been sceptical about these currencies and are apprehensive about the associated risks.

Recently, there have been a rising number of advertisements promising easy and high returns on investments in cryptocurrencies, amid concerns over such currencies being allegedly used for luring investors with misleading claims.

Sources: NDTV News : click the link for more information.

If you want to know more about what’s happening in the world of Crypto, then stay connected with DocTooLss , or just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Cryptocurrency heard a lot but what is it ???

Blockchain

Today when we all are trying to get back to our normal lives after the struck of the pandemic COVID19, there is still something more which we are reading daily but not understanding it i.e. Cryptocurrency.

Although Cryptocurrency is an ocean itself, here we are trying to understand the basis of it, lets see some technical terms related to cryptocurrency.

What is Cryptocurrency?

Cryptocurrency is a type of digital currency which uses digital files as money.

What is BitCoin?

Bitcoin is the best known cryptocurrency.

What are the Types of Cryptocurrency?

There are many types of cryptocurrency such as BitCoin, Ethereum, Ripple, Tether, Shiba, Sandbox etc.

Bitcoin is the best known cryptocurrency whereas a cryptocurrency is a medium of exchange.

What is Blockchain Technology?

Blockchain is a type of security in cryptography where it uses cryptography encryption to protect every transaction.

In technical terms, blockchain is a system of recording information in a way that makes it difficult or impossible to change, hack, or cheat the system. Each block in the chain contains a number of transactions, and every time a new transaction occurs on the blockchain, a record of that transaction is added to every participant’s ledger.

What is the role of Blockchain in cryptocurrency?

Blockchain forms the bedrock for cryptocurrencies like Bitcoin. By spreading its operations across a network of computers, blockchain allows Bitcoin and other cryptocurrencies to operate without the need for a central authority, by this, it not only reduces the risk but also eliminates many of the processing and transaction fee.

If you want to know more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

SPLUNK..!!!!

Whenever we are in a group surrounded by Cyber experts somewhere or the other talk there is a discussion on this tool known as SPLUNK. Some get goosebumps and don’t understand what is this greek talking about either we start turning back our mind pages or mostly we do Google.

So here we talk about in gist as what exactly is SPLUNK:

SPLUNK

What is Splunk?

Splunk is a tool that is used for monitoring, searching, analyzing and visualizing machine-generated data in real-time. It helps improve velocity, quality and the business impact of app delivery. It is commonly used for information security and development operations and more advanced use cases for custom machines, the Internet of Things, and mobile devices.

How it Works?

It indexes and correlates information in a container that makes it searchable and possible to generate alerts, reports, and visualizations.

What is Splunk in DevOps?

For IT teams adopting DevOps, Splunk software helps improve velocity, quality, and app delivery’s business impact.

Splunk Products

Splunk is available in three different versions.

  • Splunk Enterprise
  • Splunk Light
  • Splunk Cloud

Splunk Processing Components

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

What is SIEM vs SIAM?

SIEM vs SIAM

SIEM: Security Information and Event Management (SIEM) is a software solution that aggregates and analyzes activity from many different resources across your entire IT infrastructure.

How do SIEM works?

It works by collecting log and event data generated by an organizations applications, security devices and host systems and bringing it together into a single centralized platform. SIEM gathers data from antivirus events, firewall logs and other locations; it sorts this data into categories, for example : malware activity and failed and successful logins. 

SIEM tool it identifies threat through a network security monitoring, which generates an alert and identifies a threat level based on predetermined rules set. Ex: If some user tries to log into an account 10 times in 10 minutes that is okay, but 100 times in 10 minutes might be flagged as an attempted attack.

By this, it detects threats and creates security alerts. SIEM’s custom dashboards and event management system improves investigative efficiency and reduces time wasted on false positives.

The threat detection element itself can help to detect threats in emails, cloud resources, applications, external threat intelligence sources and endpoints. This can include user and entity behaviour analytics (UEBA) which analyzes behaviours and activities to monitor for abnormal behaviours which could indicate a threat. It can also detect behaviour anomalies, lateral movement and compromised accounts.

Main features of SIEM

  • Threat Detection
  • Investigation
  • Time to respond

SIAM: Service Integration and Management (SIAM) is an approach to managing multiple suppliers of services (business services as well as information technology services) and integrating them to provide a single business-facing IT organization.

If you want to more about it, then just drop an email to info@doctoolss.com or contact the undersigned.

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

Azure vs AWS (Battle for the No.1 Spot)…!!

AWS vs Azure

Day in day out we talk about the cloud and the services provided by them. The market today is led by AWS followed by Azure and catching up are GCP (Google Cloud Platform).

There are around 160+ services provided by AWS and counts are adding up whereas in Azure the services are lesser than AWS but are also getting added up with time.

Let’s have a sneek peek at some of the important services by these market leaders:

AWS EC2 Vs Azure VM

AWS EC2 Instance Vs Azure VM Scale Sets

AWS S3 Vs Azure Blob Storage

AWS Lambda/Fargate Vs Azure Functions

AWS Beanstalk Vs Azure App Service

AWS SQS Vs Azure Queue Storage

AWS ELB (Elastic Load Balancer) Vs Azure Load Balancer

AWS VPN Vs Azure Virtual Network

AWS DynamoDB Vs Azure Cosmos DB

AWS Shield Vs Azure DDoS

AWS RDS Vs Azure SQL DB

AWS Red Shift Vs Azure Synapse Analytics

AWS Rekognition/Lex/Polly/Transcribe Vs Azure Cognitive Service

For more information on the above AWS services, click here

For more information on the above Azure services, click here

We at DocTooLss are certified by AWS & Azure certificates and day in & day out make ourselves well versed with the AWS & Azure ongoing cloud services.

We can even assist our clients in understanding the cloud & the services provided by them, so no need to go anywhere or pay a huge amount of money on online big educational institutions. Just drop an email to info@doctoolss.com or contact the undersigned .

DocTooLss

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/ | WordPress: https://doctoolss.wordpress.com/

The technology behind RoBooCoP…!

RoboTss

As we go around the globe we see that we all are facing this pandemic situation even now when we are near to the mid of 2021 but we still are facing this crises caused by COVID19 . We at DocTooLss believe that all our readers and followers are staying at home & following the COVID SMS rule i.e.

SMS Rule

  • Social Distancing
  • Masking
  • Sanitizing

So now coming to our topic of Robotic technology , I guess we would be aware about Star Trek movies , The Robocop series or during our childhood we must have seen technology based cartoons such as “The Jetson’s” which use to get aired on “Cartoon Network” or the stone age cartoon “The Flintstones” which was just a opposite of “The Jetson’s”.

Now in 2021 we have come across with many robotic technology based machines and could even purchase from our very own e-commerce website Amazon.com

There are robotic based vacuum cleaners, the automatic drones, Alexa, Siri the voice assistance are some of the examples in AI and Machine Leaning technology .

What are Robots?

Robots are the intersection of science, engineering and technology that produces machines.

Types of Robots

Pre-Programmed Robots

Humanoid Robots

Autonomous Robots

 Teleoperated Robots

Augmenting Robots

Uses of Robots

Manufacturing

Logistics

Home

Travel

Healthcare

Differences between Cobots & Robots 

Cobots are designed to work alongside human employees, whereas industrial robots work on their own. A cobot can assist human employees. Whereas, industrial robots are used to automate the manufacturing process independently without any intervention from humans.

For more information on these devices, click here

About DocTooLss :

We make Technology EaZy via Docs” 

Follow us @doctools8 | Website: www.doctoolss.com| Tumblr: https://www.tumblr.com/blog/doctoolss | Medium: https://medium.com/@doctoolss| Facebook: https://www.facebook.com/DTdoctoolss/| Linkedin: https://www.linkedin.com/in/doc-tools-a302311a9/

Website Built with WordPress.com.

Up ↑

Create your website with WordPress.com
Get started