Microsoft Ignite – Day 2 Roundup

After a very exciting first day, back for another fast paced day in the world of Microsoft Ignite with again, quite a number of new additions/announcements to Azure.

Session: Architecting and implementing Governance across your subscriptions

Speakers: Joseph Chan

Governance is a requirement in any project, especially more and more sought after in today’s cloud world.

“Azure enables your organisation’s development and IT departments to be agile by making it easy to create, read, update, and delete resources as needed. However, while giving unrestricted resource access to developers can make them very agile, it can also lead to unintended cost consequences. The solution to this problem is resource access governance—the ongoing process of managing, monitoring, and auditing the use of Azure resources to meet the goals and requirements of your organization.”


Azure Governance can be broken into three main areas:

  • Resource Organisation
  • Control & Compliance
  • Environment Deployment

100% of the top 300 Azure customers use policy. Azure Case study with BP to show how governance has assisted them.

Common guardrails – Leverage built-in initiatives and policies, examples of Azure Policies from GitHub


Session: Protect your cloud workload from threats using Azure Security Center

Speakers: Yinon Costica

Intelligent Security

  • Identity and access management: Your universal platform to manage and secure identities
  • Threat protection: Stop attacks with integrated and automated security
  • Information Protection: Protect your sensitive data – wherever it lives or travels
  • Cloud Security: Safeguard your cross-cloud resources

Common threats seen in the wild


  • Brute force of open management ports
  • Exploit through an unpatched vulnerability


  • Exposed Kubernetes Dashboards
  • RBAC not configured in the cluster
  • Insecure container/host configuration

App Services

  • Web shell deployment
  • Reconnaissance attempts

SQL Database

  • SQL injection vulnerabilities and attacks
  • Access by a remote threat actor

Storage account

  • Access by a remote threat actor
  • Public access to storage accounts

Key Vault

  • Harvest for secrets
  • Permissive policies grant access to unneeded resources

Azure can assist with all these threats to minimise the potential attack vector including the following to help:-

  • $1B annual investment in cybersecurity
  • 3500+ global security experts
  • Trillions of diverse signals for unique intelligence

Azure Security Centre can protect your workloads from threats, it uses industry’s most extensive threat intelligence to gain deep insights including:-

  • Detect & block advanced malware and threats for Linux and Windows Servers on any cloud
  • Protect cloud-native services from threats
  • Protect data services against malicious attacks
  • Protect your Azure IoT solutions with near real time monitoring
  • Service layer detections: Azure network layer and Azure management layer (ARM)

Protecting Linux and Windows VMs from threats

Reduce open network ports

Protect against malware

Announcement: Protect hybrid data centres and multi-cloud with Azure security centre

  • Hybrid Service protection for Datacenters and other clouds
  • Onboard on-prem servers to Security Center from Windows Admin Center
  • Auto onboard AWS EC2 instances using new API connector (Preview)

Announcement: built-in vulnerability assessment for VMs

  • Automated deployment of the vulnerability scanner
  • Continuously scans installed applications to find vulnerabilities
  • Visibility to the vulnerability finds in Security Center for portal and APIs

Announcement: Built-in vulnerability assessment for container images

  • Seamless deployment and configuration of the vulnerability scanner
  • Scan container images for vulnerabilities upon push to an ACR
  • Visibility to vulnerable ACR container images including vulnerabilities details, severity, classification and guidance to remediation

Protecting AKS

  • Actionable recommendations based on AKS best practices
  • Cluster and Node Threat detection based on AKS audit log and Node Autid

New advanced protection capabilities for data services

  • Protect SQL servers on Azure VMs: Vulnerability assessment and Advanced Threat protection to prevent and detect threats across SQL estate in Azure
  • Malware reputation screening for Azure Storage: Detect advanced threats in Azure Storage with hash reputation analysis upon upload
  • Advanced Threat Protection for Azure Key Vault: Detect unusual and potentially harmful attempts to exploit Key Vault

Session: PowerShell unplugged with Jeffrey Snover and Jason Helmick

What a session, from start to finish – it was highly entertaining!

Demoing throughout new features coming from PowerShell 7..

  • PowerShell non .exe install without admin user credentials
  • GP out-gridview
  • PowerShell Vault / Secrets Management

The rest of my day today spent time going through the Vendor hall – it is massive! Seeing what products that we may need to use.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s