SNP’s Managed Detect & Response Services Powered by Microsoft Sentinel & Defenders (MXDR)

SNP’s Managed Detection and Response (MDR) for Microsoft Sentinel service, brings integrations with Microsoft services like Microsoft Defenders (MXDR), threat intelligence and customer’s hybrid and multi-cloud infrastructure to monitor, detect and respond to threats quickly. With our managed security operations team, SNP’s threat detection experts help identify, investigate and provide high fidelity detection through ML-based threat modelling for your hybrid and multicloud infrastructure.

SNP’s MXDR Services Entitlements:

SNP’s Managed services security framework brings the capability of centralized security assessment for managing your on-premises or cloud infrastructure, where we offer:

 

Leveraging SNP’s security model below, we help our customers:

  • Build their infrastructure and applications with cloud-native protection throughout their cloud application lifecycle.
  • With defined workflows, customers get the ease of separating duties in entitlements management to protect against governance and compliance challenges.
  • Data security is prioritized to protect sensitive data from different data sources to the point of consumption.
  • With Azure Sentinel, we consolidate and automate telemetry across attack surfaces while orchestrating workflows and processes to speed up response and recovery.

 

SNP’s Managed Extended Detection & Response (MXDR) Approach:

Our 6-step incident response approach helps our customers maintain, detect, respond, notify, investigate, and remediate cyberthreats as shown below:

 

For more on SNP’s Managed Detect & Response Services Powered by Microsoft Sentinel & Defenders (MXDR), contact us on Azure Marketplace or our security experts here.

How DevOps in the Cloud Improves Application Delivery and Efficiency

DevOps is a cultural shift and a healthy collaboration between development and operations. There is no single DevOps tool, rather a set consisting of multiple tools that range from version control of source code to application life cycle management. With DevOps, siloed roles like development, IT operations, quality engineering, and security coordinate and collaborate seamlessly.

Some of the ways DevOps has proven to increase application delivery and efficiency for our customers include:

Dev & Ops Collaboration:

Raise efficiency, quality, and speed through better development and operations collaboration.

Centralized Source Code Management:

Version control of application source code and multiple team members to work on application code development parallelly, branching strategies improve the team development efforts

Rapid Delivery:

Move to continuous integration (CI), and continuous delivery (CD) with the test, release, and deployment automation process.

Automate Infrastructure: 

Automate as many of your processes as you can through virtualization, and configuration management to add agility to your infrastructure.

Microservices & Containerization: 

Develop and change applications faster and easier by making development, test and production environments more consistent.

Cloud Migration: 

Migrate and deliver applications in the cloud with scalability, resilience, and security.

Visibility

Manage, track, and report end-to-end software delivery for all stakeholders.

Flexibility

Get access to existing toolsets and processes, along with future technologies to help you automate and orchestrate activities.

Security

Get a centralized repository for all security, standards, and compliance policies spanning across functions, tools, and platforms.

Unlimited Scalability

Scale as your business grows and get a single source for sharing control and visibility.

Extensibility

DevOps offers strong integration capabilities that allow easy integration between tools and automation platforms.

 

For more information on how DevOps can help improve your business’ performance, Contact SNP Technologies here.

How DevOps in the Cloud Improves Application Delivery and Efficiency

Azure Database for MariaDB, MySQL and PostgreSQL – A Fully Managed Service

SNP Technologies brings the power and ease of OpenSource Platform as a Service (PaaS) to your data workloads

Azure Database for MariaDB, MySQL and PostgreSQL services offer fully managed database services built on the proven relational database services foundation which also delivers Azure SQL Database to millions of databases worldwide. Users can provision a new instance in minutes and quickly scale the compute power needed online to respond to their dynamic business needs.

Quickly respond to demand with built-in high availability and scalability, and high-security features to keep your data safe and compliant. Users can provision a new instance in minutes and quickly scale the compute power needed online to respond to their dynamic business needs.

Each of these databases as a service comes with automated patching, the highest level of security & protection, high availability, and is fully supported by Microsoft from the all the way through database engine.

Key Features Include:

  • Built-in high availability
  • Dynamic scaling
  • Meet on-demand fluctuations in performance demand
  • MySQL 5.6 – 8.0 supported version
  • PostgreSQL 9.5-11 supported version
  • MariaDB 10.2-10.3 supported version
  • Limit access by IP Address
  • VNet integration supported
  • Data-in replication for hybrid data and multi-cloud synchronization
  • MySQL Workbench compatible
  • SSL connections supported
  • Server monitoring

Business Benefits:

  • Eliminate hardware costs and reduce administrative costs.
  • Pay-as-you-go with options to scale up or out for greater power with zero interruption.
  • Enterprise-ready open-source database engines.
  • Native integration with Azure PaaS.
  • Meets high availability requirements with 99.99% uptime SLA from Microsoft.

For more information on SNP’s Azure Database for MariaDB, MySQL and PostgreSQL – Fully Managed Service, contact us here.

Bring your Data Securely to the Cloud by Implementing Column Level security, Row Level Security & Dynamic Data Masking with Azure Synapse Analytics

Azure Synapse Analytics from Microsoft is a limitless analytics service that brings together data integration, enterprise data warehousing, and big data analytics. SNP helps its customers migrate their legacy data warehouse solutions to Azure Synapse Analytics to gain the benefits of an end-to-end analytics platform that provides high availability, security, speed, scalability, cost savings, and industry-leading performance for enterprise data warehousing workloads.

A common business scenarios we cover:

As organizations scale, data grows exponentially. And with the workforce working remotely, data protection is one of the primary concerns of organizations around the world today. There are several high-level security best practices that every enterprise should adopt, to protect their data from unauthorized access. Here are our recommendations to help you prevent unauthorized data access.

The SNP solution:

With Azure Synapse Analytics, SNP provides its customers enhanced security with column level security, row-level security & dynamic data masking.

Azure Synapse SecurityBelow is an example of a sample table data which is required to implement the column level security, row-level security & dynamic data masking for your data.

Revenue table:

Azure Synapse Security

Codes:

Step:1 Create users

create user [CEO] without login;

create user [US Analyst] without login;

create user [WS Analyst] without login;

 

Column Level Security

A column-level security feature in Azure Synapse simplifies the design and coding of security in applications. It ensures column-level security by restricting column access to protect sensitive data.

In this scenario, we will be working with two users. The first one is the CEO, who needs access to all company data. The second one is an Analyst based in the United States, who does not have access to the confidential Revenue column in the Revenue table.

Follow this lab, one step at a time to see how Column-level security removes access to the revenue column to US Analyst.

 

Step:2 Verify the existence of the “CEO” and “US Analyst” users in the Data Warehouse.

SELECT Name as [User1] FROM sys.sysusers WHERE name = N’CEO’;

SELECT Name as [User2] FROM sys.sysusers WHERE name = N’US Analyst’;

 

Step:3 Now let us enforce column-level security for the US Analyst.

The revenue table in the warehouse has information like Analyst, CampaignName, Region, State, City, RevenueTarget, and Revenue. The Revenue generated from every campaign is classified and should be hidden from US Analysts.

REVOKE SELECT ON dbo.Revenue FROM [US Analyst];

GRANT SELECT ON dbo.Revenue([Analyst], [CampaignName], [Region], [State], [City], [RevenueTarget]) TO [US Analyst];

Azure Synapse SecurityThe security feature has been enforced,  where the following query with the current user as ‘US Analyst’, this will result in an error. Since the US Analyst does not have access to the Revenue column the following query will succeed since we are not including the Revenue column in the query.

Azure Synapse SecurityAzure Synapse Security

Row Level Security

Row-level Security (RLS) in Azure Synapse enables us to use group membership to control access to rows in a table. Azure Synapse applies the access restriction every time data access is attempted from any user.

In this scenario, the revenue table has two Analysts, US Analysts & WS Analysts. Each analyst has jurisdiction across a specific Region. US Analyst on the South East Region. An Analyst only sees the data for their own data from their own region. In the Revenue table, there is an Analyst column that we can use to filter data to a specific Analyst value.

SELECT DISTINCT Analyst, Region FROM dbo.Revenue order by Analyst ;

Review any existing security predicates in the database

SELECT * FROM sys.security_predicates

 

Step:1

Create a new Schema to hold the security predicate, then define the predicate function. It returns 1 (or True) when a row should be returned in the parent query.

CREATE SCHEMA Security

GO

CREATE FUNCTION Security.fn_securitypredicate(@Analyst AS sysname)

RETURNS TABLE

WITH SCHEMABINDING

AS

RETURN SELECT 1 AS fn_securitypredicate_result

WHERE @Analyst = USER_NAME() OR USER_NAME() = ‘CEO’

GO

Step:2

Now we define a security policy that adds the filter predicate to the Sale table. This will filter rows based on their login name.

CREATE SECURITY POLICY SalesFilter 

ADD FILTER PREDICATE Security.fn_securitypredicate(Analyst)

ON dbo.Revenue

WITH (STATE = ON);

Allow SELECT permissions to the Sale Table.

GRANT SELECT ON dbo.Revenue TO CEO, [US Analyst], [WS Analyst];

 

Step:3

Let us now test the filtering predicate, by selecting data from the Sale table as ‘US Analyst’ user.

Azure Synapse SecurityAs we can see, the query has returned rows here. Login name is US Analyst and Row-level Security is working.

Azure Synapse Security

Azure Synapse Security

Dynamic Data Masking

Dynamic data masking helps prevent unauthorized access to sensitive data by enabling customers to designate how much of the sensitive data to reveal with minimal impact on the application layer. DDM can be configured on designated database fields to hide sensitive data in the result sets of queries. With DDM the data in the database is not changed. Dynamic data masking is easy to use with existing applications since masking rules are applied in the query results. Many applications can mask sensitive data without modifying existing queries.

In this scenario, we have identified some sensitive information in the customer table. The customer would like us to obfuscate the Credit Card and Email columns of the Customer table to Data Analysts.

Let us take the below customer table:

Azure Synapse SecurityConfirmed no masking enabled as of now,

Azure Synapse Security

Let us make masking for Credit card & email information,

Step:1

Now let us mask the ‘CreditCard’ and ‘Email’ Column of the ‘Customer’ table.

ALTER TABLE dbo.Customer 

ALTER COLUMN [CreditCard] ADD MASKED WITH (FUNCTION = ‘partial(0,”XXXX-XXXX-XXXX-“,4)’);

GO

ALTER TABLE dbo.Customer

ALTER COLUMN Email ADD MASKED WITH (FUNCTION = ’email()’);

GO

 

Now, the results show masking enabled for data:

Azure Synapse SecurityExecute query as User ‘US Analyst’, now the data of both columns is masked,

Azure Synapse SecurityUnmask data:

Azure Synapse Security

Conclusion:

From the above samples, SNP has shown how column level security, row level security & dynamic data masking can be implemented in different business scenarios. Contact SNP Technologies for more information.

Top 5 FAQs on Operationalizing ML Workflow using Azure Machine Learning

Enterprises today are adopting machine learning and artificial intelligence (AI) at a rapid pace to stay ahead of their competition, deliver innovation, improve customer experiences, and grow revenue. However, the challenges with such integrations is that the development, deployment and monitoring of these models differ from the traditional software development lifecycle that many enterprises are already accustomed to.

Leveraging AI and machine learning applications, SNP helps bridge the gap between the existing state and the ideal state of how things should function in a machine learning lifecycle to achieve scalability, operational efficiency, and governance.

SNP has put together a list of the top 5 challenges enterprises face in the machine learning lifecycle and how SNP leverages Azure Machine Learning to help your business overcome them.

Q1. How much investment is needed on hardware for data scientists to run complex deep learning algorithms?

By leveraging Azure Machine Learning workspace, data scientists can use the same hardware virtually at a fraction of the price. The best part about these virtual compute resources is that businesses are billed based on the amount of resources consumed during active hours thereby reducing the chances of unnecessary billing.

Q2: How can data scientists manage redundancy when it comes to training segments and rewriting existing or new training scripts that involves collaboration of multiple data scientists?  

With Azure data pipelines, data scientists can create their model training pipeline consisting of multiple loosely coupled segments which are reusable in other training pipelines. Data pipelines also allows multiple data scientists to collaborate on different segments of the training pipeline simultaneously, and later combine their segments to form a consolidated pipeline.

Q3. A successful machine learning life cycle involves a data scientist finding the best performing model by using multiple iterative processes. Each process involves manual versioning which results to inaccuracies during deployments and auditing. So how best can data scientists manage version controlling?

Azure Machine Learning workspace for model development can prove to be a very useful tool in such cases. It tracks performance metrics and functional metrics of each run to provide the user with a visual interface on model performance during training. It can also be leveraged to register models developed on Azure Machine Learning workspace or models developed on your local machines for versioning. Versioning done using Azure Machine Learning workspace makes the deployment process simpler and faster.

Q4. One of the biggest challenges while integrating the machine learning model with an existing application is the tedious deployment process which involves extensive manual effort. So how can data scientists simplify the packaging and model deployment process?

Using Azure Machine Learning, data scientists and app developers can easily deploy Machine Learning models almost anywhere. Machine Learning models can be deployed as a standalone endpoint or embedded into an existing app or service or to Azure IoT Edge devices.

Q5. How can data scientists automate the machine learning process?

A data scientist’s job is not complete once the Machine Learning model is integrated into the app or service and deployed successfully. It has to be closely monitored in a production environment to check its performance and must be re-trained and re-deployed once there is sufficient quantity of new training data or when there are data discrepancies (when actual data is very different from the data on which your model is trained on and is affecting your model performance).

Azure Machine Learning can be used to trigger a re-deployment when your Git repository has a new code check-in. Azure Machine Learning can also be used to create a re-training pipeline to take new training data as input to make an updated model. Additionally, Azure Machine Learning provides alerts and log analytics to monitor and govern the containers used for deployment with a drag-drop graphical user interface to simplify the model development phase.

Start building today!

SNP is excited to bring you machine learning and AI capabilities to help you accelerate your machine learning lifecycle, from new productivity experiences that make machine learning accessible to all skill levels, to robust MLOps and enterprise-grade security, built on an open and trusted platform helping you drive business transformation with AI. Contact SNP here.

Azure’s Software Defined Connectivity — Virtual WAN

The hybrid cloud network consists of both physical and virtualized technologies to provide connectivity across Cloud, private data centers, on-premises, and branch offices. To help customers with their massive modernization efforts, SNP leverages the Azure Virtual WAN to build and deploy applications while simplifying branch connectivity. 

Azure Virtual WAN:

Azure’s Virtual WAN is software-defined connectivity that allows you to take advantage of optimized and automated branch connectivity on a global scale with Azure. Virtual WAN provides a better networking experience by seamlessly connecting branches to Azure with SDWAN & VPN devices (i.e., Customer Premises Equipment or CPE) with built-in ease of use and configuration management. It also provides security and routing functionalities to provide a single operational interface.

  • Branch connectivity (via connectivity automation from Virtual WAN Partner devices such as SD-WAN or VPN CPE).
  • Site-to-site VPN connectivity.
  • Remote user VPN connectivity (point-to-site).
  • Private connectivity (ExpressRoute).
  • Intra-cloud connectivity (transitive connectivity for virtual networks).
  • VPN ExpressRoute inter-connectivity.
  • Routing, Azure Firewall, and encryption for private connectivity.

 

How it works:

Traffic from branches goes into Microsoft’s network at the Microsoft edge site which is closest to a given branch office. Currently, there are 130 of these sites in the Microsoft global network. Once traffic is within the network, it can terminate one of your Virtual WAN’s virtual hubs. These hubs cover different Azure public Cloud regions around the world.

 

Azure’s Virtual WAN offers benefits like:

  • Integrated connectivity solutions in hub and spoke: Automate site-to-site configuration and connectivity between on-premises branch office and an Azure hub.
  • Automated spoke setup and configuration: Connect virtual networks and workloads to the Azure hub seamlessly.
  • Intuitive troubleshooting: Ability to see the end-to-end flow within Azure, and then use this information to take required actions.
  • Massive scalability with software-defined connectivityConnect global branch offices, point-of-sale locations, and sites using Azure and the Microsoft global network.
  • Optimize security and agility: Leverage secure transport network services and integrated firewall capabilities to ensure the secure delivery of all applications across your hybrid enterprise. Securely identify and manage the performance of today’s modern and encrypted applications running over SSL, TLS, and HTTPS.
  • One place for managing your network: Quickly respond to the needs of your business with application-centric, business intent-based policies that are centrally managed and applied network-wide across all remote locations.
  • Reduced costs: Maximize the use of redundancy and lower-cost connectivity options with zero-touch provisioning and centralized management to reduce the cost of deploying and maintaining a hybrid WAN architecture.
  • Reliability: Create a highly available WAN architecture that virtualizes and dynamically leverages multiple links at remote locations. Retain end-to-end visibility of network performance and end-user experience for troubleshooting and problem resolution.
  • Performance: Deliver superior application performance to your business with the industry-leading WAN optimization solution from SNP.

 

For more information on Azure Virtual WAN, contact SNP Technologies here.

8 Best Practices for Managing a Hybrid Cloud Environment

Pursuing a hybrid cloud strategy offers your business the combination of the customizability and security of a private cloud with the scalability and flexibility of a public cloud.

Designing and managing a hybrid cloud strategy requires careful planning and execution to ensure optimal performance, security, and alignment with business goals. Here are some best practices organizations can leverage:

1. Perform Data Center Assessment: 

As a first step, it is crucial to perform a data center workload assessment and identify workloads for migration & modernization, focusing on:

  • The inventory of the workloads
  • Dependencies of the workloads
  • Classification of the workloads

2.Rationalization: 

Once the inventory and dependencies of data center workloads have been identified, the rationalization process helps design the hybrid cloud roadmap. Where:

  • Workloads that are suitable for migration are identified
  • Workloads that would remain on-premises are identified
  • Dependencies of each workload is identified noting their impact on the migration and modernization process
  • Mission-critical and highly confidential workloads that are a part of the migration process are identified

Once the segregation of the workloads is completed, this information is used to build a hybrid cloud roadmap

3. Establish Cloud Governance:

As a part of the hybrid cloud strategy, it is essential to understand the current IP policy framework and establish a proper governance policy while expanding to public or private cloud environments. The governance framework focuses on Cloud workload operations and requirements, regulatory compliance, mission-critical applications, and (or) environments.

4. Create Stringent Guidelines and Policies: 

This focuses on creating document policies and guidelines for applications and data that are being migrated to a private or a public cloud environment. Performance and regulatory requirements, mission-critical environments, geographic restrictions, and strategic core business applications are just some of the things to keep in mind as you create these rules of engagement.

5. Reassess your Resources: 

A hybrid Cloud solution opens your enterprise to new capabilities and new technologies, so you must assess how these vast resources can help you address the needs of your business without hindering the current functioning of your processes. This is a great opportunity to rethink your business processes and become more efficient as an IT organization.

6. Monetization: 

The hybrid cloud offers opportunities to save your company money, whether by providing on-demand capacity and (or) performance or augmenting your current IT team with additional resources. Every future CAPEX expenditure for hardware should be scrutinized to see if a public or hybrid cloud solution would help reduce or eliminate those costs. You can transition your business from a CAPEX model to an OPEX model.

7. Manpower Management: 

Hybrid clouds are very complex and require expertise for implementation, migration, and management across compliance, storage, networking, and virtualization. You could either train your in-house resources to build a hybrid cloud or rely on a trusted vendor or service provider to be part of your solution.

8. Implement Hybrid Cloud in Stages: 

The implementation of your hybrid cloud solution is the key to building trust with your executive management, end-users, and customers, so it is not something to be done hastily. Test by migrating a few applications or workloads in your hybrid cloud and if successful, migrate additional workloads as you feel more comfortable and confident. The flexible nature of the hybrid cloud allows you to continually modify and improve your processes until you are satisfied.

 

For more details information on Hybrid Cloud, contact an SNP representative.

Ensure PaaS Resources Are Private in Your Hybrid Cloud

Use a secure hub-spoke network architecture and Azure Policies to enforce the use of Private Endpoints in a hub’s centralized, private DNS zone.

Security is a leading concern as enterprises adopt hybrid cloud strategies and a challenging one at that. At SNP Technologies, we have hybrid security solutions to meet the stringent security requirements of our customers.

In this article, we highlight the scenario wherein the organization has adopted Azure managed resources, such as Azure SQL Database and Azure App Service, in their hybrid cloud solution architecture. These so-called “platform-as-a-services” resources (or PaaS for short) are exposed to the public internet by default.

Hence, the challenge is how to reign in the PaaS resources, so their traffic only flows over the organization’s private network. The solution entails the integration of DNS zones with private endpoints and the use of government policies to enforce the security configuration for each PaaS resource added to the network.

First, we discuss a recommended network architecture to fulfill this requirement. Then we provide examples of governance policies designed by SNP that enforce secure practices for private IP range integration and name resolution. These methods solve many hybrid cloud solution architecture concerns, like:

  • Configuring a Hub & Spoke network model with an Azure private DNS zone
  • Handling the redirect of DNS queries originating from on-premises to an Azure private DNS zone via a private IP
  • Providing an Azure Virtual Network private IP for Azure managed (PaaS) resources (e.g., Azure SQL, App Service)
  • Connecting Azure PaaS resources to Azure private DNS zones for DNS resolution
  • Blocking public endpoints on Azure PaaS resources
  • Deploying PaaS resources on different subscriptions within the same tenant

Networking Solution

Figure 1 illustrates the architecture designed by SNP engineers to secure a hybrid cloud having PaaS resources. This example has an Azure SQL database and the architecture features:

  1. For the on-premises network, the Active Directory DNS servers are configured with conditional forwarders for each private endpoint public DNS zone, such as *.database.windows.net* and *.windows.net*. These are then pointed to the DNS server hosted in the Hub VNet in Azure.
  2. The DNS server hosted in the hub VNet on Azure uses the Azure-provided DNS resolver (168.63.129.16) as a forwarder.
  3. The virtual network used as a hub VNet is linked to the Private DNS zone for Azure services names, such as privatelink.database.windows.net.
  4. The spoke virtual network is only configured with hub VNet DNS servers and will send requests to DNS servers.
  5. When the DNS servers hosted on Azure VNet are not the authoritative Active Directory domain names, conditional forwarders for the private link domains are set up on on-premises DNS servers pointing to the azure DNS forwarders.

Figure 1

 

Governance Solution

A ensure private networking for PaaS resources, the following conditions should be met:

  • The PaaS resource has a private endpoint, not a public endpoint
  • A DNS record for the PaaS resource is entered in the central, private DNS zone for the entire network

Below we describe three policies that work together to ensure these conditions are met.

Please note that the policies are customized and not built-in Azure policies (e.g. Azure Policy samples). In the list of resources provided at the end of this article is a link to a tutorial on how to create a custom policy definition in Azure.

Policy 1: Disable public endpoint for PaaS services

Why: Access to endpoints are by default accessible over the public internet.

How: This policy prevents users from creating Azure PaaS services with public endpoints and invokes an error if the private endpoint is not configured at resource creation.

Note: In Azure, the resource that enables the private endpoint is Azure Private Link. Please refer to the Resources section at the end of this article for links to related Azure documentation.

Figure 2 depicts the Azure Portal screen when the policy criteria is not met:

1. Validation fails because of the governance policy

2. Error Details indicate the Azure Policy that disallows the Public Endpoint creation

3. In the Networking section we see that “Private endpoint” setting is set to “None”

4. Once the Private endpoint is added, the policy validation passes (Figure 3)

Figure 2

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

 

Figure 3

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

Policy 2: Deny creation of a private DNS zone with a Private Link prefix

Why: By default, when you create a private endpoint, a private DNS zone is created on each spoke subscription.

As a centralized DNS with a conditional forwarder and private DNS zones is used in our architecture, we need to prevent the user from creating their own Private Link, private DNS zones for each new resource added to the network. If ungoverned, sprawl would occur.

How: This policy prevents creation of a private DNS zone with a Private Link prefix in the spoke subscriptions. With Policy 3 that follows, we associate the newly created resource with a central, private DNS zone already in the hub.

Figure 4 shows the Azure Portal screen when the policy criteria is not met, and user tries to deploy a DNS zone for a Private Link.

1. Deployment fails due to policy

2. Error Details shows the Azure Policy that denied creation of resource and the reason

Figure 4

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

To avoid the deployment error, during resource creation, users must set the “Integrate with private DNS zone” to “No” (Figure 5).

Figure 5

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

 

If the user tries to create a private endpoint with Private link integration, then the policy will deny creation of the resource during validation as depicted in Figure 6, the Azure Portal resource creation screen when the “Integrate with DNS private zone?” setting is set to “Yes”.

1. Integrate with Private DNS Zone is set to “Yes”.

2. Error details reference the policy that denied creation of resource, and reason.

Figure 6

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

 

Figure 7 depicts the Azure Portal screen when the “Integrate with DNS private zone?” setting is set to “No”.

3. The setting is observed in the Networking configuration

4. Policy validation passes

Figure 7

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

Policy 3: “Deploy If Not Exists” policy to automate DNS entries

Why: As described above, since the “Integrate with DNS private zone?” setting is set to “No”, a DNS zone for the Private Link is not created. Therefore, we need to have a method to integrate the Private Link with the centralized DNS zone of the hub. Out of the box, Azure does not provide this option during resource creation.

How: We use a Remediation policy to automate the DNS entry. Within Azure, resources that are non-compliant to a deployIfNotExists policy can be put into a compliant state through Remediation.

The Azure portal screen captures below depict the policy remediation plan:

1. In Figure 8 we see the policy to remediate. The Remediation task is to automatically  add the Azure Resource DNS record to the central private DNS zone.

2. Figure 9 shows that the remediation policy successfully added the DNS entries on the private DNS zone for the respective Private Link DNS records.

Figure 8

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

 

Figure 9

Networking Solution for Ensure PaaS Resources Are Private in Your Hybrid Cloud

 

Conclusion

In this article we have shown how one can securely deploy Azure PaaS resources with private endpoints. While thoughtful hybrid network planning is a given, Azure governance is an ingredient for success that is often overlooked. We hope you explore the resources provided below to learn more about Azure Private Link, how DNS in Azure is managed and how Azure Policy can automate the governance of resource creation once the network and security foundation is in place. Contact SNP Technologies Here.

Resources

Accelerate App Innovation with SNP’s Azure Kubernetes Services

Businesses know that shifting to the cloud can reduce costs, boost performance, and enable them to scale based on rising (or falling) traffic. However, reports show that in 2019, just 22% of enterprise primary workload deployments were on the public cloud. The top issue: complex legacy apps that are resistant to modernization.

Common issues facing IT teams today include:

  • Scalability: Existing DevOps infrastructure cannot scale to accommodate growth.
  • Infrastructure: VM software requires significant space, limiting potential ROI.
  • Potential for Modernization: Internal resources are not equipped to optimize a cloud solution.
  • Technical Debt: Technical debt drives incompatibility with cloud solutions.
  • Speed: Latency and time to deployment for new apps needs to be reduced.
  • Security: Need to improve control over security of app data.

Modern approaches to software development deliver value faster by breaking large applications into smaller containers. These containers make it easier for your team to split a large legacy app into smaller modules that can be built, tested, and deployed.

SNP’s Azure Kubernetes Services (AKS) is a fully managed Kubernetes solution that lets you:

  • Simplify Operations:  AKS simplifies operations and gives you access to improved security, lower costs, and the innovative potential of the cloud.
  • Innovation: Create new revenue opportunities; provide business partners and customers secure access to corporate resources; leverage data analytics and AI to advance business insights.
  • Security, Identity and Governance: Leverage Microsoft’s enterprise security by enabling user identity framework and governance solutions.
  • Business Continuity &  Disaster Recovery: Leverage Azure’s dynamic disaster recovery capabilities.
  • Increase speed-to-market: Accelerate efficiency in an agile application development cycle; enable improved management and scalability; enable rapid development of new business tools and applications.
  • Flexibility: Implement co-existence of on-premises and cloud solutions; provide support for customer’s open source development initiatives.

Why SNP?

We Deliver Expertise: SNP helps customers drive  organizational maturity through improved technical agility.

Get IT Done, Faster: We help you make the right decisions  and accelerate  implementation.

Exceptional Azure Know How: Together, SNP and Azure are  leveraging the power of the cloud for digital innovation.

Contact SNP Technologies here

Simplify Cloud Security Across Hybrid & Multicloud with Azure Arc

Cloud infrastructure usage has seen tremendous growth in the past few years. As an established Microsoft Gold Partner, SNP is in a unique position where we help our customers build and manage their Cloud platform securely.

Leveraging Microsoft Azure,  we are blurring the lines between the traditional categories of platform and management as we deliver an open cloud platform that has built-in security and operations management – and can still meet the needs of our large enterprise customers.

Some of the key features that can help you monitor, secure, and manage your hybrid cloud with the broad built-in security and management capabilities are:

Azure Governance and Compliance: 

The Azure governance features help implement governance across environments, helps in creating hierarchies, applying Azure policies, creating blueprints, inventory management and optimize cost using Azure Cost management.

Azure Cost Management:

Cost management is a critical concern for many businesses, but with this feature now available for customers and partners for free, Azure spend can be managed and optimized seamlessly across Azure, AWS, and Google Cloud Platforms.

Microsoft Defender for Cloud for Hybrid Workloads:

Microsoft Defender for Cloud helps you protect all workloads running in Azure, on-premises and in other cloud platforms from cyber threats. With the recent release of new capabilities, customers can better detect and defend against advanced threats, automate and orchestrate security workflows, and streamline the investigation of threats.

Azure Auto Manage for Virtual Machines:

This feature simplifies the process of the entire VM life cycle by enrolling services like Microsoft Defender for Cloud, VM inventory, backup, VM insights, update management, change tracking, DSC, guest configuration, and more to your existing virtual machines.

End-to-End Monitoring of Applications & Infrastructure:

The new Azure monitor user experience centralizes the monitoring services together, so that you can get visibility across your infrastructure and applications. In addition, the application insights feature has been further optimized for application performance monitoring and failure diagnostics in applications.

Azure Arc – Hybrid Workload Management:

Customers can now manage their hybrid server infrastructure located on-premises or another cloud platform (AWS, Google, etc.). Azure Arc can deliver the following products and features for hybrid servers- Inventory with single plane of management experience, update management, Azure policies, Microsoft Defender for Cloud, integration of device logs with Sentinel, Azure automation, track configuration changes, auto manage for Arc enabled servers, efficiently manage Windows and Linux virtual machines in Azure, and across hybrid environments.

For more details of information on Hybrid Cloud Security & Management, contact an SNP representative