The Azure Necronomicon: Unraveling Identity's Cosmic Horror
BrandonDeVault
388 views
38 slides
Sep 26, 2024
Slide 1 of 38
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
About This Presentation
Dive into the eldritch depths of Azure’s identity management, where the seemingly mundane task of handling user identities and service principals transforms into a journey through cosmic horror. In this talk, we will embark on an arcane expedition to decipher the mysteries of Azure identities. Wit...
Dive into the eldritch depths of Azure’s identity management, where the seemingly mundane task of handling user identities and service principals transforms into a journey through cosmic horror. In this talk, we will embark on an arcane expedition to decipher the mysteries of Azure identities. Witness how the multitude of GUIDs, those cryptic runes cast by Microsoft into every log, hold the secrets to understanding and mastering the dark arts of cloud identity management.
This session is for those brave souls who dare to confront the bewildering complexity of Azure’s identity services, seeking to cross-correlate the abyssal expanse of activities within the Azure cosmos. Prepare to have the veil lifted on the arcane rituals of authentication, authorization, and the spectral analysis of logs. Whether you are a novice acolyte or a seasoned necromancer of cloud identities, this talk promises revelations that will enlighten, terrify, and empower you to command the forces of Azure’s identity infrastructure.
Size: 45.1 MB
Language: en
Added: Sep 26, 2024
Slides: 38 pages
Slide Content
Unraveling Identity's Cosmic Horror Brandon DeVault Sr. Security Researcher, CrowdStrike Cyber Operations, National Guard The Azure Necronomicon:
What this talk is NOT A guide on how authentication works in Azure Why you should buy product X over product Y A solution to all your problems
Management Control Data Cloud Planes Overall resources and lifecycle Configurations and operations User data processing and storage
Management Control Data Cloud Planes Overall resources and lifecycle Configurations and operations User data processing and storage
Why not Microsoft security? Who did what?
Chapter 1 The Summoning of Users and Service Principals
Identities Users Roles Groups Applications Service Principals
Users
Microsoft Entra ID Tenant Microsoft Entra ID Subscription Azure Environment Resource Group Management Group Microsoft Environment M365 Defender Power Platform Microsoft 365
Methods of authenticating Azure Portal Entra ID ADFS Hybrid Authentication (pass-through auth, password hash synchronization, federation with third-party) CLI Interfaces and APIs Managed Identities B2B / B2C SSH Key Authentication Certificate-Based Authentication VPN and Virtual Network Gateways
Service Principals / Applications
Types of Service Principals Application Managed Identity Legacy
Azure Tenant 1 Azure Tenant 2 Entra ID Subscription 1 Application Service Principal Service Resource Resource Resource Subscription 2 Subscription 3 Service Principal Entra ID
Groups
Management Groups Above Subscriptions Policy / Compliance Resource Groups For grouping resources VMs, web apps, databases, etc. Groups can be nested Management Groups Subscriptions Resources Resource Groups
Roles
Microsoft Entra ID Tenant Microsoft Entra ID Subscription Azure Environment Resource Group Management Group Microsoft Environment M365 Defender Power Platform Microsoft 365
Azure built-in roles Entra built-in roles 312 105
High-privileged role
Global Unique Identifier (GUID)
Chapter 2 The Rituals of Non-Standardization
Importance of Field Normalization When searching for a value, all results must be returned Capitalization matters! Improves performance