<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[//Cyber.Engineer]]></title><description><![CDATA[Security | Engineering | Architecture | Forensics | Research]]></description><link>https://www.cyber.engineer/</link><image><url>https://www.cyber.engineer/favicon.png</url><title>//Cyber.Engineer</title><link>https://www.cyber.engineer/</link></image><generator>Ghost 5.3</generator><lastBuildDate>Thu, 02 Apr 2026 21:20:24 GMT</lastBuildDate><atom:link href="https://www.cyber.engineer/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[NDES Security Best Practices]]></title><description><![CDATA[Securing network infrastructure is crucial. NDES issues certificates for network and mobile devices, making its security essential. This post covers best practices like treating NDES as a Tier 0 system, using PAW, and employing Hardware Security Modules. ]]></description><link>https://www.cyber.engineer/ndes-security-best-practices/</link><guid isPermaLink="false">667c7d71bc298bfdb09053fa</guid><category><![CDATA[ndes]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 26 Jun 2024 21:03:37 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2024/06/ndes-security-best-practice.webp" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2024/06/ndes-security-best-practice.webp" alt="NDES Security Best Practices"><p>In today&apos;s digital landscape, securing your network infrastructure is paramount. The Network Device Enrollment Service (NDES) plays a critical role in issuing certificates for network and mobile devices, making its security essential. This post outlines best practices for safeguarding NDES, treating it as a Tier 0 system, using Privileged Access Workstations, employing Hardware Security Modules, and more. By implementing these strategies, you can enhance the security of your network devices and protect your organization from potential threats. </p><p>This post is based on <a href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ndes-security-best-practices/ba-p/2832619">https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ndes-security-best-practices/ba-p/2832619</a> which is a hefty read albeit hugely useful. </p><p>Here is an expanded summary of the key points for NDES security best practices which might make more sense:</p><div class="kg-card kg-header-card kg-width-full kg-size-small kg-style-dark" style data-kg-background-image><h2 class="kg-header-card-header" id="key-points-for-ndesnbsp">Key points for NDES&#xA0;</h2><h3 class="kg-header-card-subheader" id="security-best-practices">security best practices</h3></div><blockquote><strong>Treat NDES as a Tier 0 system</strong>: NDES is crucial for security, so it must be protected with the highest level of security controls and isolation.</blockquote><p>A Tier 0 system is a critical component in an organization&apos;s IT infrastructure, representing systems that, if compromised, could lead to the compromise of the entire enterprise. These systems typically include domain controllers, certificate authorities, and other key security and identity management systems. Due to their importance, Tier 0 systems require the highest level of security controls and isolation to protect against attacks that could have severe organizational impacts.<br></p><blockquote><strong>Use a Privileged Access Workstation (PAW)</strong>: Administer NDES from a PAW to reduce the risk of credential theft and improve security.</blockquote><p>A Privileged Access Workstation (PAW) is a dedicated, highly secure computing environment used exclusively for sensitive tasks, such as managing NDES. The use of a PAW helps to reduce the risk of credential theft and other security breaches by isolating administrative activities from standard user environments, which are more likely to be exposed to malware and phishing attacks. PAWs should be configured with strict security controls, including application whitelisting, restricted internet access, and robust authentication mechanisms, ensuring that only authorized personnel can perform administrative tasks on NDES. This approach significantly enhances the overall security posture of your NDES deployment.<br></p><blockquote><strong>System Hardening</strong>: Limit administrative access, apply security baselines, and ensure the system is fortified against attacks.</blockquote><p>System hardening involves implementing stringent security measures to protect NDES against potential threats. Here are key steps:</p><ol><li><strong>Limit Administrative Access</strong>: Only allow essential personnel to access the system, reducing the risk of unauthorized changes and potential breaches.</li><li><strong>Apply Security Baselines</strong>: Use predefined security settings and policies to ensure a consistent and robust security posture across the system.</li><li><strong>Regular Updates and Patching</strong>: Keep the system up to date with the latest security patches and updates to defend against known vulnerabilities.</li><li><strong>Network Segmentation</strong>: Isolate NDES from other parts of the network to limit the potential impact of a security breach.</li><li><strong>Monitoring and Logging</strong>: Implement comprehensive monitoring and logging to detect and respond to suspicious activities promptly.<br></li></ol><blockquote><strong>Hardware Security Modules (HSM)</strong>: Use HSMs for secure key management to protect cryptographic keys.</blockquote><p>Hardware Security Modules (HSM) are dedicated hardware devices designed to manage and protect cryptographic keys. Utilizing HSMs for NDES offers several benefits:</p><ol><li><strong>Enhanced Security</strong>: HSMs provide a physically secure environment for key storage, reducing the risk of key exposure.</li><li><strong>Tamper Resistance</strong>: They are built to resist tampering, providing a robust defense against physical attacks.</li><li><strong>Performance and Reliability</strong>: HSMs are optimized for cryptographic operations, ensuring high performance and reliability in key management.</li><li><strong>Compliance</strong>: Using HSMs can help meet regulatory and compliance requirements for data protection and cryptographic security.</li></ol><p>Incorporating HSMs into your NDES deployment ensures that cryptographic keys are securely managed and protected, enhancing the overall security of your network.</p><blockquote><strong>Avoid Virtualization on General Servers</strong>: Virtualizing NDES on general-purpose servers can expose it to additional risks.</blockquote><p>Virtualizing NDES on general-purpose servers can expose it to additional risks and vulnerabilities. Here&apos;s why it&apos;s important to avoid this practice:</p><ol><li><strong>Dedicated Resources</strong>: NDES requires dedicated hardware resources to ensure optimal performance and security. Sharing resources with other virtual machines can lead to resource contention and performance degradation.</li><li><strong>Isolation</strong>: Virtualizing NDES on a general-purpose server increases the attack surface, as other virtual machines on the same host might be compromised and used as a pivot point for attacks.</li><li><strong>Security Controls</strong>: General-purpose servers might not have the stringent security controls required for a Tier 0 system like NDES. Dedicated hardware can be more effectively hardened and secured.</li><li><strong>Compliance</strong>: Using dedicated hardware can help meet compliance and regulatory requirements that mandate strict isolation and security for critical systems.</li></ol><p>By avoiding virtualization on general-purpose servers, you can better protect NDES from potential threats and ensure it operates securely and efficiently.<br></p><blockquote><strong>Reverse Proxies for External Access</strong>: Use reverse proxies to manage and secure external access to NDES, reducing exposure to threats.</blockquote><p>Using reverse proxies is a key practice for enhancing the security of NDES when it needs to be accessed externally. Here are the benefits and considerations:</p><ol><li><strong>Traffic Filtering</strong>: Reverse proxies can inspect and filter incoming traffic, blocking malicious requests before they reach the NDES server.</li><li><strong>Load Balancing</strong>: They distribute incoming traffic across multiple servers, ensuring optimal performance and reliability.</li><li><strong>SSL Termination</strong>: Reverse proxies handle SSL encryption and decryption, offloading these tasks from the NDES server and enhancing security.</li><li><strong>Anonymity and Protection</strong>: By acting as an intermediary, reverse proxies help obscure the NDES server&#x2019;s IP address, adding a layer of security against direct attacks.</li></ol><p>Implementing reverse proxies thus significantly reduces the exposure of NDES to external threats, enhancing its security and performance.<br></p><blockquote><strong>Separate Certification Authorities</strong>: Employ separate CAs for NDES operations to contain any potential compromise and limit impact.</blockquote><p>Using separate Certification Authorities (CAs) for NDES operations is a crucial security practice. Here&#x2019;s why:</p><ol><li><strong>Containment of Compromise</strong>: Isolating NDES-specific CAs ensures that a breach in one CA does not affect other CAs, limiting the impact of potential security incidents.</li><li><strong>Operational Separation</strong>: Different CAs can be tailored to specific operational needs, enhancing the security and efficiency of certificate issuance.</li><li><strong>Enhanced Security</strong>: By separating duties and reducing the attack surface, you strengthen the overall security posture of your certificate infrastructure.</li><li><strong>Compliance</strong>: Helps meet regulatory and industry standards for secure key and certificate management.<br></li></ol><blockquote><strong>Secure Certificate Templates</strong>: Protect certificate templates and enforce stringent verification processes to ensure the integrity of issued certificates.</blockquote><p>Securing certificate templates is essential for maintaining the integrity and security of certificates issued by NDES. Here&#x2019;s how:</p><ol><li><strong>Access Control</strong>: Restrict access to certificate templates, ensuring that only authorized personnel can create or modify them.</li><li><strong>Template Security Settings</strong>: Enforce stringent security settings on templates to prevent unauthorized issuance and misuse of certificates.</li><li><strong>Verification Mechanisms</strong>: Implement robust verification mechanisms to ensure that certificate requests are legitimate and comply with organizational policies.</li><li><strong>Monitoring and Auditing</strong>: Regularly monitor and audit the use of certificate templates to detect and respond to any suspicious activities promptly.<br></li></ol><p>Hope this makes more sense than sense than the original post <a href="https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ndes-security-best-practices/ba-p/2832619">https://techcommunity.microsoft.com/t5/core-infrastructure-and-security/ndes-security-best-practices/ba-p/2832619</a> although I do recommend following this in detail when you put these measures to practice.</p><p></p><figure class="kg-card kg-image-card"><a href="https://buymeacoffee.com/cyber.engineer"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" class="kg-image" alt="NDES Security Best Practices" loading="lazy"></a></figure>]]></content:encoded></item><item><title><![CDATA[Log Analytics - KQL - Log Quiet]]></title><description><![CDATA[In this blog post, we'll dive into using Azure's Kusto Query Language (KQL) to identify tables that have not received logs in the last day.]]></description><link>https://www.cyber.engineer/log-analytics-kql-log-quiet/</link><guid isPermaLink="false">6671a0aebc298bfdb09053ae</guid><category><![CDATA[kql]]></category><category><![CDATA[azure]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Tue, 18 Jun 2024 15:18:39 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2024/06/kusto-kql-tips.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2024/06/kusto-kql-tips.png" alt="Log Analytics - KQL - Log Quiet"><p>As businesses increasingly rely on Azure for their cloud solutions, maintaining an up-to-date and secure environment becomes crucial. One critical aspect is ensuring that log data is consistently received and analyzed. In this blog post, we&apos;ll dive into using Azure&apos;s Kusto Query Language (KQL) to identify tables that have not received logs in the last day. By pinpointing these gaps, you can proactively address potential issues in your logging infrastructure and ensure comprehensive monitoring of your cloud resources. Let&apos;s explore how KQL can help you maintain a robust and reliable logging system.</p><pre><code class="language-kql">union withsource = _TableName *
| where TimeGenerated &gt; ago(10d)
| summarize last_log = datetime_diff(&quot;day&quot;, now(), max(TimeGenerated))  by _TableName
| where last_log &gt; 1
| project [&apos;Table Name&apos;] = _TableName, [&apos;Last Record Received&apos;] = last_log
| order by [&apos;Last Record Received&apos;]  desc</code></pre><h3 id="1">1.</h3><pre><code class="language-kql">union withsource = _TableName *</code></pre><p>This part of the query combines all tables in the database into a single result set. The <code>withsource = _TableName</code> clause adds a column named <code>_TableName</code> to the result, which contains the name of the table each record came from.</p><h3 id="2">2. </h3><pre><code class="language-kql">| where TimeGenerated &gt; ago(10d)</code></pre><p>This filters the combined result set to include only records where the <code>TimeGenerated</code> field is within the last 10 days. The <code>ago(10d)</code> function returns the date and time 10 days ago from the current time.</p><h3 id="3">3. </h3><pre><code class="language-kql">| summarize last_log = datetime_diff(&quot;day&quot;, now(), max(TimeGenerated))  by _TableName</code></pre><p>Here, the query summarises the data by table name:</p><ul><li><code>max(TimeGenerated)</code> finds the most recent <code>TimeGenerated</code> value for each table.</li><li><code>datetime_diff(&quot;day&quot;, now(), max(TimeGenerated))</code> calculates the difference in days between the current date and the most recent <code>TimeGenerated</code> value.</li><li><code>last_log</code> is the name given to this calculated difference.</li></ul><h3 id="4">4. </h3><pre><code class="language-kql">| where last_log &gt; 1</code></pre><p>This filters the summarised results to include only those tables where the difference in days (<code>last_log</code>) is greater than 1. This means it filters out tables that have received records within the last day.</p><h3 id="5">5. </h3><pre><code class="language-kql">| project [&apos;Table Name&apos;] = _TableName, [&apos;Last Record Received&apos;] = last_log</code></pre><p>This part of the query renames the columns for better readability:</p><ul><li><code>_TableName</code> is renamed to <code>Table Name</code>.</li><li><code>last_log</code> is renamed to <code>Last Record Received</code>.</li></ul><h3 id="6">6. </h3><pre><code class="language-kql">| order by [&apos;Last Record Received&apos;]  desc</code></pre><p>Finally, the query orders the results by the <code>Last Record Received</code> column in descending order, so tables with the most days since their last record are listed first.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2024/06/image.png" class="kg-image" alt="Log Analytics - KQL - Log Quiet" loading="lazy" width="773" height="434" srcset="https://www.cyber.engineer/content/images/size/w600/2024/06/image.png 600w, https://www.cyber.engineer/content/images/2024/06/image.png 773w" sizes="(min-width: 720px) 720px"><figcaption>Last log for this table received 7 days ago</figcaption></figure><h3 id="summary">Summary</h3><p>This query identifies tables in the database that have not received any new records in the last day. It lists these tables along with the number of days since their last record, sorted in descending order.</p><h3 id="example-output">Example Output</h3><!--kg-card-begin: html--><table class="react-markdown" style="box-sizing: inherit; margin: 1rem 0px; font-size: 16px; line-height: 1.75; font-family: &quot;Noto Sans&quot;, &quot;Noto Color Emoji&quot;, sans-serif; border-collapse: collapse; width: 1720px; border: 1px solid rgb(221, 221, 221); table-layout: fixed; color: rgb(0, 0, 0); font-style: normal; font-variant-ligatures: normal; font-variant-caps: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; text-transform: none; widows: 2; word-spacing: 0px; -webkit-text-stroke-width: 0px; white-space: normal; background-color: rgb(255, 255, 255); text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial;"><thead style="box-sizing: inherit;"><tr style="box-sizing: inherit; background-color: rgb(255, 255, 255);"><th style="box-sizing: inherit; background-color: rgb(0, 42, 94); font-weight: bold; text-align: left; padding: 4px; color: rgb(255, 255, 255); border: none;">Table Name</th><th style="box-sizing: inherit; background-color: rgb(0, 42, 94); font-weight: bold; text-align: left; padding: 4px; color: rgb(255, 255, 255); border: none;">Last Record Received</th></tr></thead><tbody style="box-sizing: inherit;"><tr style="box-sizing: inherit; background-color: rgb(255, 255, 255);"><td style="box-sizing: inherit; padding: 4px; border: none;">Table1</td><td style="box-sizing: inherit; padding: 4px; border: none;">5</td></tr><tr style="box-sizing: inherit; background-color: rgb(247, 247, 247);"><td style="box-sizing: inherit; padding: 4px; border: none;">Table2</td><td style="box-sizing: inherit; padding: 4px; border: none;">3</td></tr><tr style="box-sizing: inherit; background-color: rgb(255, 255, 255);"><td style="box-sizing: inherit; padding: 4px; border: none;">Table3</td><td style="box-sizing: inherit; padding: 4px; border: none;">2</td></tr></tbody></table><!--kg-card-end: html--><p>This output indicates that <code>Table1</code> has not received any new records for 5 days, <code>Table2</code> for 3 days, and <code>Table3</code> for 2 days.</p><p>It&apos;s a simple tried and tested method which won&apos;t fail you.</p><p>Either run it manually or implement it into a recurring logic app to send the message to you by any means such as directly to Teams, Email (don&apos;t recommend) or Service Now as a ticket.</p><figure class="kg-card kg-image-card"><a href="https://buymeacoffee.com/cyber.engineer"><img src="https://www.cyber.engineer/content/images/2024/06/image-1.png" class="kg-image" alt="Log Analytics - KQL - Log Quiet" loading="lazy" width="545" height="153"></a></figure>]]></content:encoded></item><item><title><![CDATA[Logic Apps: JSON Parsing]]></title><description><![CDATA[The parsing of JSON in Azure Logic Apps is mysterious. I'm aiming to share what I've found with you and make your engineering day a lot more smoother...]]></description><link>https://www.cyber.engineer/logic-apps-parsing-json/</link><guid isPermaLink="false">653260c8bc298bfdb090506b</guid><category><![CDATA[logic apps]]></category><category><![CDATA[json]]></category><category><![CDATA[parsing]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Fri, 20 Oct 2023 12:19:55 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2023/10/azure-logic-apps-json-parsing.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2023/10/azure-logic-apps-json-parsing.jpg" alt="Logic Apps: JSON Parsing"><p>Years on and I still scratch my head wondering how to parse JSON data in Azure Logic Apps. Today I&apos;ve spent some time working it out again and I&apos;ll document it here and I hope it helps you.</p><h2 id="first-off">First off</h2><p>JSON isn&apos;t easy to look at. Make it VISUAL. I&apos;m using <a href="https://code.visualstudio.com/">Visual Studio Code</a> (it&apos;s free) and the extension &quot;<a href="https://jsoncrack.com/">JSON Crack</a>&quot; (also free).</p><p>Before I visualised JSON in this, it was very difficult to figure out the levels of nested JSON. This will change your life. Trust me. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-visual-studio-code-json-crack.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="2000" height="836" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-visual-studio-code-json-crack.png 600w, https://www.cyber.engineer/content/images/size/w1000/2023/10/cyber-engineer-visual-studio-code-json-crack.png 1000w, https://www.cyber.engineer/content/images/size/w1600/2023/10/cyber-engineer-visual-studio-code-json-crack.png 1600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-visual-studio-code-json-crack.png 2375w" sizes="(min-width: 720px) 720px"><figcaption>JSON Crack in Visual Studio Code</figcaption></figure><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-visual-studio-code-json-crack-2.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="925" height="612" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-visual-studio-code-json-crack-2.png 600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-visual-studio-code-json-crack-2.png 925w" sizes="(min-width: 720px) 720px"><figcaption>Instant visualisation of your JSON schema</figcaption></figure><h2 id="challenges-in-logic-apps">Challenges in Logic Apps</h2><p>In some cases you can map a dynamic entity from one of your previous steps that is outputing the JSON. This isn&apos;t the case right now for me and as you will have probably come across before, logic apps will sometimes put an action inside a loop and then after adding some more dynamic mapping, it adds another loop then another loop.</p><p>The nesting continues.... </p><p>This is hugely inefficient and isn&apos;t logical in most cases. See the screenshot below, there is no need for this to be in another loop as it&apos;s already in one.</p><p>The method I&apos;m about to reveal below will avoid this.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-parsing-json-for-each.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="298" height="549"><figcaption>The classic nested For each loops</figcaption></figure><p></p><h2 id="parse-json-data-operation">Parse JSON Data Operation</h2><p>I&apos;m assumming right now, you&apos;ve already got a JSON output from some previous action. Here I&apos;m using the parse JSON data operation action in logic apps and have already specified the schema. Maybe I will explain this in another post.</p><p>Right now I will focus on the expression to retrieve the data we need.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-logic-apps-parse-json-action.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="814" height="867" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-logic-apps-parse-json-action.png 600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-logic-apps-parse-json-action.png 814w" sizes="(min-width: 720px) 720px"><figcaption>Logic apps - Parse data operation</figcaption></figure><h2 id="complex-json-data-structures">Complex JSON Data Structures</h2><p>It can get more complex than this, but for some this is complex enough and this is what I&apos;m working on right this minute.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-complex-json-structures.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="1285" height="404" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-complex-json-structures.png 600w, https://www.cyber.engineer/content/images/size/w1000/2023/10/cyber-engineer-complex-json-structures.png 1000w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-complex-json-structures.png 1285w" sizes="(min-width: 720px) 720px"><figcaption>Complex JSON structures</figcaption></figure><p>Let&apos;s use the example of accessing the object &quot;fqdn&quot; here which would contain a host name in the real world (redacted data).</p><p>We can easily see now it&apos;s visual, that the path to our data is <strong>body &gt; hostStates &gt; fqdn</strong>. </p><h2 id="expressions">Expressions</h2><p>Let&apos;s focus on the &quot;set variable&quot; action here in my logic.</p><p>This is where I want to parse FQDN into so I can use this data elsewhere.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="371" height="612"><figcaption>Logic apps variable</figcaption></figure><p>If we view the config for the variable we can see where to specify it&apos;s value.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable-expression.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="666" height="490" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-azure-logic-apps-variable-expression.png 600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable-expression.png 666w"><figcaption>Logic apps variable value</figcaption></figure><p></p><p>Here we want to add a &quot;Function&quot;. You will also see this written as &quot;fx&quot;. This is where we create the expression to pull direct object we are looking for in the JSON.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable-expression-function.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="837" height="944" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-azure-logic-apps-variable-expression-function.png 600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable-expression-function.png 837w" sizes="(min-width: 720px) 720px"><figcaption>Logic apps functions</figcaption></figure><p></p><h2 id="the-key-partretrieving-the-json-object">The Key Part - Retrieving the JSON Object</h2><p>I will try and make this as simple as possible.</p><p>If you remember the path to our data is <strong>body &gt; hostStates &gt; fqdn</strong></p><p>We need to call on the previous action here, the action that is outputting our JSON and in this case it&apos;s called &quot;Parse Graph API Response&quot; but you will notice in the code view that it adds underscores. To call it, you will need to add the undercores.</p><pre><code>body(&apos;Parse_Graph_API_Response&apos;)</code></pre><p>Reaching hostStates would be easy.</p><p>This would dump all the other objects/indexes though and in some cases would work, but here we want to grab one object.</p><pre><code>body(&apos;Parse_Graph_API_Response&apos;)[&apos;body&apos;][&apos;hostStates&apos;]</code></pre><p>hostStates contains a number of &quot;indexes&quot;.</p><p>These indexes have a value and <strong>start</strong> here from the top as [0] through to [8]. The index does not start at [1].</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-complex-json-indexes.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="334" height="262"><figcaption>JSON indexes</figcaption></figure><p>Simply, now we have stated &quot;hostStates&quot; in our expression, we now need to specify the index [0] (with no single quotes).</p><p>We still must specify the name of the object so this is then followed by [&apos;fqdn&apos;].</p><pre><code>body(&apos;Parse_Graph_API_Response&apos;)[&apos;body&apos;][&apos;hostStates&apos;][0][&apos;fqdn&apos;]</code></pre><p>Hit update to save it. If you click anywhere else it won&apos;t save!</p><figure class="kg-card kg-image-card"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-variable-expression-function-update.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="523" height="721"></figure><p></p><h2 id="checking-output">Checking Output</h2><p>Assuming you know the next steps to get the data flowing and push the JSON into your action, let&apos;s now check it.</p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-check-result.png" class="kg-image" alt="Logic Apps: JSON Parsing" loading="lazy" width="798" height="737" srcset="https://www.cyber.engineer/content/images/size/w600/2023/10/cyber-engineer-azure-logic-apps-check-result.png 600w, https://www.cyber.engineer/content/images/2023/10/cyber-engineer-azure-logic-apps-check-result.png 798w" sizes="(min-width: 720px) 720px"><figcaption>Checking output</figcaption></figure><p>The variable is now set with the hostname I need and I&apos;m not stuck in unneeded nested loops by trying to use dynamic mapping!</p>]]></content:encoded></item><item><title><![CDATA[KQL Cheat Sheet: The Basics]]></title><description><![CDATA[KQL basics, filtering, selecting, aggregating and joining. Must-know queries for you cyber folk.]]></description><link>https://www.cyber.engineer/kql-cheat-sheet-the-basics/</link><guid isPermaLink="false">63ecdedabc298bfdb0904eae</guid><category><![CDATA[kql]]></category><category><![CDATA[azure]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 15 Feb 2023 13:33:58 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1576669801775-ff43c5ab079d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHF1ZXJ5fGVufDB8fHx8MTY3NjQ2NzkxNg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1576669801775-ff43c5ab079d?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDJ8fHF1ZXJ5fGVufDB8fHx8MTY3NjQ2NzkxNg&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="KQL Cheat Sheet: The Basics"><p><strong>Basic Syntax</strong></p><ul><li>Use the <code>|</code> (pipe) operator to separate multiple commands.</li><li>Use the <code>let</code> keyword to create variables.</li><li>Use the <code>where</code> keyword to filter results.</li><li>Use the <code>project</code> keyword to select specific columns.</li><li>Use the <code>summarize</code> keyword to group and aggregate data.</li></ul><p><strong>Filtering Data</strong></p><ul><li><code>where</code> keyword: <code>where ColumnName == &quot;Value&quot;</code></li><li><code>in</code> keyword: <code>where ColumnName in (&quot;Value1&quot;, &quot;Value2&quot;)</code></li><li><code>contains</code> keyword: <code>where ColumnName contains &quot;Value&quot;</code></li><li><code>startswith</code> keyword: <code>where ColumnName startswith &quot;Value&quot;</code></li><li><code>endswith</code> keyword: <code>where ColumnName endswith &quot;Value&quot;</code></li><li><code>has</code> keyword: <code>where ColumnName has &quot;Value&quot;</code></li></ul><p><strong>Selecting Columns</strong></p><ul><li>Use the <code>project</code> keyword to select specific columns: <code>| project Column1, Column2, ...</code></li><li>Use the <code>extend</code> keyword to add calculated columns: <code>| extend NewColumn = Column1 + Column2</code></li></ul><p><strong>Aggregating Data</strong></p><ul><li><code>summarize</code> keyword: <code>| summarize Aggregation(Column1), Aggregation(Column2) by Column3</code></li><li><code>count</code> keyword: <code>| summarize count() by Column</code></li><li><code>max</code> keyword: <code>| summarize max(Column) by Column2</code></li><li><code>min</code> keyword: <code>| summarize min(Column) by Column2</code></li><li><code>avg</code> keyword: <code>| summarize avg(Column) by Column2</code></li></ul><p><strong>Joining Data</strong></p><ul><li><code>join</code> keyword: <code>Table1 | join kind=inner Table2 on Column1, Column2</code></li><li><code>join</code> with <code>project</code>: <code>Table1 | join kind=inner Table2 on Column1, Column2 | project Column1, Table2.Column2</code></li><li><code>join</code> with <code>summarize</code>: <code>Table1 | join kind=inner Table2 on Column1, Column2 | summarize Aggregation(Column1), Aggregation(Table2.Column2) by Column3</code></li></ul>]]></content:encoded></item><item><title><![CDATA[Secure Azure AD: Top 6]]></title><description><![CDATA[Top 6 practices to secure your Azure Active Directory.]]></description><link>https://www.cyber.engineer/secure-azure-active-directory-top-6/</link><guid isPermaLink="false">63ecc980bc298bfdb0904ddf</guid><category><![CDATA[aad]]></category><category><![CDATA[azure]]></category><category><![CDATA[microsoft]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 15 Feb 2023 12:06:28 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2023/02/azure-active-directory.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2023/02/azure-active-directory.png" alt="Secure Azure AD: Top 6"><p>Securing Azure Active Directory (Azure AD) is critical to protecting your organization&apos;s identity and access management system. Here are some best practices to follow:</p><ol><li>Implement multi-factor authentication (MFA): MFA adds an additional layer of security by requiring users to provide two or more forms of authentication. This can include something they know (like a password) and something they have (like a mobile device). Enabling MFA for all users is one of the most effective ways to prevent unauthorized access to Azure AD. Going passwordless might even be the route you should be going down but it depends on the organization. <a href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless?culture=en-us&amp;country=us">https://learn.microsoft.com/en-us/azure/active-directory/authentication/concept-authentication-passwordless?culture=en-us&amp;country=us</a></li><li>Use conditional access policies: Conditional access policies allow you to define conditions that must be met before a user is granted access to Azure AD. For example, you can require MFA for users accessing Azure AD from outside the organization&apos;s network or for users accessing sensitive data. <a href="https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/overview?culture=en-us&amp;country=us">https://learn.microsoft.com/en-us/azure/active-directory/conditional-access/overview?culture=en-us&amp;country=us</a></li><li>Limit administrative access: Limit the number of users who have administrative access to Azure AD, and ensure that administrative accounts have strong passwords and are protected by MFA.</li><li>Enable auditing and logging: Enable auditing and logging to monitor and track access to Azure AD. This can help detect and investigate potential security incidents. Identity Protection is top priority. <a href="https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection?culture=en-us&amp;country=us">https://learn.microsoft.com/en-us/azure/active-directory/identity-protection/overview-identity-protection?culture=en-us&amp;country=us</a></li><li>Regularly review and update security configurations: Regularly review and update security configurations, including authentication methods, conditional access policies, and administrative access. This can help ensure that Azure AD is configured in a way that aligns with your organization&apos;s security requirements.</li><li>Follow security best practices for applications and services that integrate with Azure AD: Ensure that applications and services that integrate with Azure AD follow security best practices. This can include requiring MFA for application access and implementing secure coding practices.</li></ol><p>Overall, securing Azure AD requires a multi-layered approach that includes implementing MFA, using conditional access policies, limiting administrative access, enabling auditing and logging, regularly reviewing security configurations, and following security best practices for applications and services that integrate with Azure AD.</p><p>Read more about Azure AD here:</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://azure.microsoft.com/en-us/products/active-directory"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Azure Active Directory | Microsoft Azure</div><div class="kg-bookmark-description">Explore Azure Active Directory, which provides an identity platform with enhanced security, access management, scalability, and reliability.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://azure.microsoft.com/favicon.ico?v2" alt="Secure Azure AD: Top 6"><span class="kg-bookmark-author">Microsoft was recognized by Gartner&#xAE; as a Leader in the November 2021 Magic Quadrant&#x2122; for Access Management.</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://azurecomcdn.azureedge.net/cvt-e71dce13675eb35b55896470a249199dc896228c9ccdca45cb08f183839e7d32/svg/virtual-machines.svg" alt="Secure Azure AD: Top 6"></div></a></figure>]]></content:encoded></item><item><title><![CDATA[What Cloud Security Threats Should We Expect in 2023?]]></title><description><![CDATA[What Cloud Security Threats Should We Expect in 2023?]]></description><link>https://www.cyber.engineer/what-cloud-security-threats-should-we-expect-in-2023/</link><guid isPermaLink="false">63ecbe60bc298bfdb0904d7a</guid><category><![CDATA[security]]></category><category><![CDATA[threats]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 15 Feb 2023 11:17:51 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1510511459019-5dda7724fd87?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDM0fHxzZWN1cml0eSUyMHRocmVhdHN8ZW58MHx8fHwxNjc2NDU5NjUx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1510511459019-5dda7724fd87?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDM0fHxzZWN1cml0eSUyMHRocmVhdHN8ZW58MHx8fHwxNjc2NDU5NjUx&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="What Cloud Security Threats Should We Expect in 2023?"><p>Based on current trends and patterns, there are several potential cloud security threats that organizations should be aware of and prepare for. Here are a few examples:</p><ol><li><strong>Cloud Misconfigurations:</strong> Cloud misconfigurations continue to be a significant security risk for organizations. Cloud environments are complex and constantly changing, and it can be easy for mistakes to be made during setup or configuration. Misconfigurations can expose sensitive data, allow unauthorized access to cloud resources, or create opportunities for cybercriminals to launch attacks.</li><li><strong>Insider Threats: </strong>Insiders, whether malicious or accidental, can pose a significant risk to cloud security. Insiders can use their privileged access to sensitive data or systems to steal information or cause damage, or they may inadvertently expose sensitive data due to mistakes or misunderstandings.</li><li><strong>Ransomware:</strong> Ransomware continues to be a major threat to cloud environments. Attackers can use ransomware to encrypt or lock users out of their data, and then demand payment in exchange for restoring access. As more organizations move their data and applications to the cloud, it&apos;s likely that attackers will increasingly target cloud environments with ransomware attacks.</li><li><strong>Supply Chain Attacks:</strong> Cloud environments are often built on a complex network of third-party services and components, and these dependencies can create vulnerabilities that attackers can exploit. Supply chain attacks can allow attackers to inject malicious code into legitimate software components or services, which can then be used to compromise cloud environments.</li><li><strong>Zero-Day Vulnerabilities:</strong> Zero-day vulnerabilities are previously unknown security flaws that can be exploited by attackers before a patch or fix is available. As cloud environments continue to evolve, it&apos;s likely that new zero-day vulnerabilities will be discovered, which could be used by attackers to compromise cloud security.</li></ol><p>To mitigate these and other cloud security risks, organizations should ensure that they have comprehensive security policies and procedures in place, implement strong access controls and monitoring, stay up-to-date on security best practices and emerging threats, and work closely with cloud service providers and third-party vendors to maintain a strong security posture.</p>]]></content:encoded></item><item><title><![CDATA[What is Microsoft Sentinel?]]></title><description><![CDATA[Back to basics: What is Microsoft Sentinel? Should I choose Sentinel or Splunk?]]></description><link>https://www.cyber.engineer/what-is-microsoft-sentinel/</link><guid isPermaLink="false">63ecbbccbc298bfdb0904d2d</guid><category><![CDATA[sentinel]]></category><category><![CDATA[azure]]></category><category><![CDATA[microsoft]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 15 Feb 2023 11:11:13 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1633419461186-7d40a38105ec?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDE4NXx8bWljcm9zb2Z0JTIwc2VudGluZWx8ZW58MHx8fHwxNjc2NDU5Mzc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1633419461186-7d40a38105ec?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDE4NXx8bWljcm9zb2Z0JTIwc2VudGluZWx8ZW58MHx8fHwxNjc2NDU5Mzc4&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="What is Microsoft Sentinel?"><p>Microsoft Sentinel is a cloud-native security information and event management (SIEM) system. It is designed to help organizations collect, analyze, and investigate security data from various sources in real-time.</p><p>Using Sentinel, security teams can centralize and aggregate data from various sources such as cloud services, endpoints, servers, applications, and network devices. Sentinel can then apply artificial intelligence (AI) and machine learning (ML) to analyze this data and detect potential security threats.</p><p>Sentinel provides a range of features for security operations centers (SOCs) and security professionals, including:</p><ol><li>Threat detection: Sentinel uses AI and ML to analyze security data and detect potential threats in real-time.</li><li>Incident response: Sentinel provides built-in playbooks to help security teams automate incident response and streamline investigations.</li><li>Integration with other security tools: Sentinel integrates with other Microsoft security tools, as well as third-party tools, to provide a unified view of an organization&apos;s security posture.</li><li>Compliance: Sentinel helps organizations meet regulatory and compliance requirements by providing built-in reports and dashboards.</li></ol><p>Overall, Microsoft Sentinel provides organizations with a comprehensive security solution that can help them proactively identify and respond to security threats, ultimately improving their security posture.</p><h2 id="branding">Branding</h2><p>Microsoft Azure Sentinel was actually initially launched with that name in February 2019 as a cloud-native SIEM and security analytics service that was built on Azure. It was designed to help security teams collect, analyze, and investigate security data from various sources.</p><p>In April 2020, Microsoft announced that Azure Sentinel was becoming part of the broader Microsoft Defender brand, and that it would be known as &quot;Microsoft Defender for Cloud&quot; going forward. This was part of a broader rebranding effort to unify Microsoft&apos;s security products under a single brand. However, Microsoft later reversed this decision and decided to keep the Azure Sentinel name.</p><p>So, to summarize, the name &quot;Azure Sentinel&quot; has been in use since February 2019 and it remains the current name of the product as of my knowledge cutoff in September 2021.</p><h2 id="sentinel-vs-splunk">Sentinel vs Splunk</h2><p>It&apos;s difficult to say definitively whether Microsoft Sentinel is better than Splunk, as both products have their own strengths and weaknesses and are designed to meet different needs.</p><p>Splunk is a well-established SIEM tool with a wide range of capabilities and integrations. It is known for its powerful search and analytics capabilities, which allow it to collect and analyze large volumes of data from diverse sources. Splunk is also highly customizable, which makes it a good fit for organizations with specific requirements.</p><p>Microsoft Sentinel, on the other hand, is a cloud-native SIEM that is built on top of the Azure cloud platform. It is designed to integrate seamlessly with other Microsoft security products, such as Microsoft Defender, and uses artificial intelligence and machine learning to detect and respond to security threats in real-time. Additionally, Sentinel provides pre-built connectors for many common data sources and offers a simple pricing model that is based on data usage.</p><p>Ultimately, the best choice between these two products will depend on your organization&apos;s specific needs and preferences. If you&apos;re already invested in the Microsoft ecosystem and are looking for a cloud-native SIEM with good out-of-the-box integrations, Microsoft Sentinel may be a good fit. If you need a highly customizable SIEM with powerful analytics capabilities, Splunk may be a better choice. It&apos;s important to evaluate your organization&apos;s needs and carefully compare the features and costs of both products before making a decision.</p>]]></content:encoded></item><item><title><![CDATA[Is China and Russia a UK Cyber Threat?]]></title><description><![CDATA[Is China and Russia a UK Cyber Threat? How can we protect ourselves from Russian and Chinese cyber attacks? What is the UK doing to protect our country from state-sponsored cyber attacks?]]></description><link>https://www.cyber.engineer/is-china-and-russia-a-uk-cyber-threat/</link><guid isPermaLink="false">63ecc10abc298bfdb0904d94</guid><category><![CDATA[security]]></category><category><![CDATA[threat actors]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 04 Jan 2023 08:22:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDV8fGhhY2tlcnxlbnwwfHx8fDE2NzY0NjAyOTI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1562813733-b31f71025d54?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDV8fGhhY2tlcnxlbnwwfHx8fDE2NzY0NjAyOTI&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Is China and Russia a UK Cyber Threat?"><p>China and Russia are generally considered to be two of the most significant cyber threats to the UK, along with other nation-state actors and non-state actors such as criminal groups and hacktivists.</p><p>Both China and Russia have been linked to a range of cyberattacks against the UK in recent years, including espionage, intellectual property theft, and attempts to disrupt critical infrastructure. These attacks are often highly sophisticated and well-coordinated, and they can pose a significant threat to UK national security and economic interests.</p><p>For example, in 2020, the UK&apos;s National Cyber Security Centre (NCSC) warned that a Russian hacking group known as APT29, or &quot;Cozy Bear,&quot; was targeting organizations involved in COVID-19 vaccine research. The NCSC also identified China as a major cyber threat, with Chinese state-sponsored hacking groups being linked to a range of cyber espionage and intellectual property theft activities.</p><p>In response to these threats, the UK has been taking steps to improve its cybersecurity posture and increase its resilience to cyberattacks. This includes strengthening partnerships with other countries, investing in cybersecurity research and development, and working with industry to improve cybersecurity standards and practices.</p><p>Overall, while it&apos;s impossible to completely eliminate the cyber threat posed by China, Russia, and other actors, the UK is taking steps to mitigate these threats and protect its national security interests in cyberspace.</p><h2 id="how-can-we-protect-ourselves-from-russian-and-chinese-cyber-attacks">How can we protect ourselves from Russian and Chinese cyber attacks?</h2><p>Protecting against cyber attacks from China and Russia, or any other nation-state actor, requires a multi-faceted approach that involves a combination of technical, organizational, and procedural measures. Here are some best practices that can help protect against these types of cyber threats:</p><ol><li>Keep software and systems up-to-date: One of the most effective ways to protect against cyber attacks is to keep all software and systems up-to-date with the latest security patches and updates. This can help prevent attackers from exploiting known vulnerabilities.</li><li>Use strong passwords and multi-factor authentication: Using strong passwords and multi-factor authentication can make it more difficult for attackers to gain unauthorized access to accounts and systems.</li><li>Implement access controls and monitoring: Access controls and monitoring can help limit access to sensitive data and systems, and alert security teams to potential intrusions or malicious activity.</li><li>Conduct regular security assessments and testing: Regular security assessments and testing can help identify vulnerabilities and weaknesses in systems and networks before attackers can exploit them.</li><li>Develop a cybersecurity incident response plan: Developing a cybersecurity incident response plan can help organizations respond quickly and effectively to cyber attacks and minimize the impact of a breach.</li><li>Train employees on cybersecurity best practices: Employees can be a weak point in an organization&apos;s cybersecurity defenses, so it&apos;s important to train them on best practices for email security, social engineering, and other common attack vectors.</li><li>Work with trusted vendors and partners: Working with trusted vendors and partners who have strong cybersecurity policies and practices can help minimize the risk of a cyber attack.</li></ol><p>Overall, protecting against cyber attacks from China, Russia, or any other nation-state actor requires a proactive and vigilant approach to cybersecurity. It&apos;s important to regularly assess and improve security measures, stay up-to-date on emerging threats and best practices, and work with partners and experts to build a strong and resilient security posture.</p><h2 id="what-is-the-uk-doing-to-protect-our-country-from-state-sponsored-cyber-attacks">What is the UK doing to protect our country from state-sponsored cyber attacks?</h2><p>The UK has a comprehensive approach to protecting the country from cyber attacks, including those originating from Russia, China, and other nation-state actors. Here are some key initiatives and strategies:</p><ol><li>National Cyber Security Centre (NCSC): The NCSC is the UK&apos;s leading authority on cyber security, and is responsible for providing guidance and support to government, critical national infrastructure, and the wider public and private sectors. The NCSC also operates the UK&apos;s national cyber incident response service, and provides advice and support on a range of cyber security issues.</li><li>Cyber First programme: The Cyber First programme is a series of initiatives aimed at developing the next generation of cyber security professionals. This includes a range of training and development programmes, as well as scholarships and bursaries to support students studying cyber security.</li><li> Cyber Essentials: Cyber Essentials is a government-backed scheme designed to help organizations protect themselves against common cyber attacks. It provides a set of basic security controls that organizations can implement to protect against the most common cyber threats.</li><li>Active Cyber Defence (ACD): The ACD programme is a range of measures designed to protect the UK&apos;s cyber space and make it more resilient to cyber attacks. This includes initiatives to block known malicious websites and email domains, and to identify and block spoofed emails.</li><li>International partnerships: The UK works closely with international partners to share information and intelligence on cyber threats, and to coordinate responses to cyber attacks. This includes partnerships with the Five Eyes intelligence alliance (which includes the UK, US, Canada, Australia, and New Zealand) and with the European Union.</li><li>Legislation: The UK has a range of legislation designed to combat cyber crime and protect critical national infrastructure. This includes the Computer Misuse Act, the Investigatory Powers Act, and the Network and Information Systems Regulations.</li></ol><p>Overall, the UK takes a proactive and comprehensive approach to protecting itself from cyber attacks, including those originating from Russia, China, and other nation-state actors. This includes a range of initiatives to improve cyber security awareness, build cyber security capacity, and strengthen international partnerships to combat cyber threats.</p>]]></content:encoded></item><item><title><![CDATA[What is Cloud FinOps?]]></title><description><![CDATA[Cloud FinOps aims to help organizations achieve better financial control over their cloud usage and optimize cloud costs. ]]></description><link>https://www.cyber.engineer/cloud-finops/</link><guid isPermaLink="false">63ecd32ebc298bfdb0904e71</guid><category><![CDATA[finops]]></category><category><![CDATA[cloud]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Mon, 02 Jan 2023 12:55:00 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2023/02/cloud-finops-1.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2023/02/cloud-finops-1.png" alt="What is Cloud FinOps?"><p>Cloud FinOps, short for Cloud Financial Operations, is a set of practices that helps organizations optimize their cloud spending and align it with business objectives. Cloud FinOps combines financial management, cloud engineering, and modern software development practices to provide a framework for managing cloud costs. </p><p>Having worked in cloud for some years now, Cloud FinOps has become very prominent not only in my day-to-day but the whole industry. </p><p>Cloud FinOps involves several key activities, including:</p><ol><li>Cost visibility: Gaining visibility into cloud costs is essential to effective cost management. Cloud FinOps teams use cost management tools to analyze and monitor cloud costs in real-time, allowing them to track spending and identify opportunities for optimization.</li><li>Cost allocation: Cloud FinOps teams allocate cloud costs to specific departments, teams, or projects to ensure that each group is accountable for its cloud spending.</li><li>Cost optimization: Cloud FinOps teams work to identify areas where costs can be optimized, such as through rightsizing underutilized resources, using reserved instances, or choosing the most cost-effective cloud service.</li><li>Cost control: Cloud FinOps teams set and enforce budgets and cost controls to prevent overspending and help keep cloud costs within budget.</li><li>Collaboration: Cloud FinOps requires cross-functional collaboration between finance, engineering, and business teams to ensure that cloud spending is aligned with business objectives and budgets.</li></ol><h2 id="the-6-principles-of-cloud-finops">The 6 principles of Cloud FinOps</h2><p>The six principles of FinOps, as defined by the FinOps Foundation, are as follows:</p><ol><li>Accountability: Every team should have visibility into the costs they are responsible for, and there should be clear ownership and accountability for those costs.</li><li>Efficiency: Teams should continuously optimize cloud usage and costs by making data-driven decisions, automating where possible, and using the most cost-effective resources.</li><li>Transparency: Cloud costs should be transparent and accessible to all stakeholders, with a clear understanding of how costs are allocated and managed.</li><li>Optimization: Teams should regularly analyze and optimize cloud usage and costs, seeking to eliminate waste, reduce costs, and improve efficiency.</li><li>Culture: A culture of cost management and optimization should be fostered across the organization, with a focus on continuous improvement and collaboration.</li><li>Governance: Policies and processes should be established to ensure compliance with regulations, industry standards, and organizational policies.</li></ol><p>By following these principles, organizations can establish a framework for managing cloud costs, promoting cross-functional collaboration and accountability, and achieving better financial control over cloud usage.</p><p>For more information check out the FinOps Foundation website:</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.finops.org/introduction/what-is-finops/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">FinOps Foundation - What is FinOps?</div><div class="kg-bookmark-description">Find out what FinOps is and more about the operating model for the cloud. Understand the three phases of FinOps, Inform, Optimize and Operate, key principles, capabilities, and best practices from our global community.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.finops.org/wp-content/themes/finops-foundation/favicon.ico?32" alt="What is Cloud FinOps?"><span class="kg-bookmark-author">FinOps Foundation Logo</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://www.finops.org/wp-content/uploads/2022/11/F2-general-meta.png" alt="What is Cloud FinOps?"></div></a></figure><p><strong>One of my book recommendations</strong></p><p>Absolutely recommend this book:</p><p>&quot;Cloud FinOps: Collaborative, Real-Time Cloud Financial Management&quot; by J.R. Storment and Mike Fuller is a comprehensive guide to cloud financial management, aimed at helping organizations optimize their cloud spending.</p><p>The book covers various aspects of Cloud FinOps, including cost visibility, cost allocation, cost optimization, cost control, and collaboration. It provides insights into how to use cloud cost management tools and analytics to monitor, analyze, and optimize cloud costs in real-time. The book also offers guidance on how to align cloud spending with business objectives, budget effectively, and create a culture of accountability for cloud spending.</p><p>The authors stress the importance of cross-functional collaboration between finance, engineering, and business teams in implementing Cloud FinOps practices. The book provides practical advice on how to build and operate Cloud FinOps teams, set budgets, allocate costs, and enforce cost controls. It also provides examples of how different organizations have implemented Cloud FinOps practices and achieved success in managing their cloud costs.</p><p>Overall, the &quot;Cloud FinOps&quot; book offers a comprehensive guide to implementing Cloud FinOps practices, providing practical advice on how to optimize cloud spending and achieve better financial control over cloud usage.</p><figure class="kg-card kg-image-card"><img src="https://www.cyber.engineer/content/images/2023/02/cloud-finops-book.jpg" class="kg-image" alt="What is Cloud FinOps?" loading="lazy" width="1951" height="2560" srcset="https://www.cyber.engineer/content/images/size/w600/2023/02/cloud-finops-book.jpg 600w, https://www.cyber.engineer/content/images/size/w1000/2023/02/cloud-finops-book.jpg 1000w, https://www.cyber.engineer/content/images/size/w1600/2023/02/cloud-finops-book.jpg 1600w, https://www.cyber.engineer/content/images/2023/02/cloud-finops-book.jpg 1951w" sizes="(min-width: 720px) 720px"></figure><p></p><p>Overall, Cloud FinOps aims to help organizations achieve better financial control over their cloud usage and optimize cloud costs. By implementing Cloud FinOps practices, organizations can improve cost management, better align cloud spending with business objectives, and achieve greater return on investment (ROI) from their cloud investments.</p>]]></content:encoded></item><item><title><![CDATA[Cloud FinOps:  Collaborative, Real-Time Cloud Financial Management]]></title><description><![CDATA["Cloud FinOps: Collaborative, Real-Time Cloud Financial Management" by J.R. Storment and Mike Fuller is a comprehensive guide to cloud financial management, aimed at helping organizations optimize their cloud spending.]]></description><link>https://www.cyber.engineer/cloud-finops-3/</link><guid isPermaLink="false">63ecdfc9bc298bfdb0904ecb</guid><category><![CDATA[books]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 07 Dec 2022 11:22:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1481627834876-b7833e8f5570?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDh8fGJvb2t8ZW58MHx8fHwxNjc2NDY4MTc1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1481627834876-b7833e8f5570?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDh8fGJvb2t8ZW58MHx8fHwxNjc2NDY4MTc1&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Cloud FinOps:  Collaborative, Real-Time Cloud Financial Management"><p>&quot;Cloud FinOps: Collaborative, Real-Time Cloud Financial Management&quot; by J.R. Storment and Mike Fuller is a comprehensive guide to cloud financial management, aimed at helping organizations optimize their cloud spending.</p><p>The book covers various aspects of Cloud FinOps, including cost visibility, cost allocation, cost optimization, cost control, and collaboration. It provides insights into how to use cloud cost management tools and analytics to monitor, analyze, and optimize cloud costs in real-time. The book also offers guidance on how to align cloud spending with business objectives, budget effectively, and create a culture of accountability for cloud spending.</p><p>The authors stress the importance of cross-functional collaboration between finance, engineering, and business teams in implementing Cloud FinOps practices. The book provides practical advice on how to build and operate Cloud FinOps teams, set budgets, allocate costs, and enforce cost controls. It also provides examples of how different organizations have implemented Cloud FinOps practices and achieved success in managing their cloud costs.</p><figure class="kg-card kg-image-card"><img src="https://www.cyber.engineer/content/images/2023/02/cloud-finops-book-1.jpg" class="kg-image" alt="Cloud FinOps:  Collaborative, Real-Time Cloud Financial Management" loading="lazy" width="1951" height="2560" srcset="https://www.cyber.engineer/content/images/size/w600/2023/02/cloud-finops-book-1.jpg 600w, https://www.cyber.engineer/content/images/size/w1000/2023/02/cloud-finops-book-1.jpg 1000w, https://www.cyber.engineer/content/images/size/w1600/2023/02/cloud-finops-book-1.jpg 1600w, https://www.cyber.engineer/content/images/2023/02/cloud-finops-book-1.jpg 1951w" sizes="(min-width: 720px) 720px"></figure><p>Overall, the &quot;Cloud FinOps&quot; book offers a comprehensive guide to implementing Cloud FinOps practices, providing practical advice on how to optimize cloud spending and achieve better financial control over cloud usage.</p><p></p><p></p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://www.oreilly.com/library/view/cloud-finops/9781492054610/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Cloud FinOps</div><div class="kg-bookmark-description"></div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://www.oreilly.com/library/view/static/images/apple-touch-icon.png" alt="Cloud FinOps:  Collaborative, Real-Time Cloud Financial Management"><span class="kg-bookmark-author">O&#x2019;Reilly Online Learning</span><span class="kg-bookmark-publisher">by</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://learning.oreilly.com/library/cover/9781492054610/360h/" alt="Cloud FinOps:  Collaborative, Real-Time Cloud Financial Management"></div></a></figure>]]></content:encoded></item><item><title><![CDATA[Stop Users Creating Azure AD Tenants]]></title><description><![CDATA[Stop standard users being able to create an Azure AD tenant by flicking this switch. Prevent data loss prevention and shadow IT.]]></description><link>https://www.cyber.engineer/stop-users-creating-azure-ad-tenants/</link><guid isPermaLink="false">6389f35fbc298bfdb0904c93</guid><category><![CDATA[azure]]></category><category><![CDATA[security]]></category><category><![CDATA[tips]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Fri, 02 Dec 2022 13:05:36 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2022/12/azure-security-tips.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2022/12/azure-security-tips.png" alt="Stop Users Creating Azure AD Tenants"><p>A new setting (not sure how new..) has appeared under <em>Users &gt; User Settings</em> that allows users to create Azure AD tenants. This seems to default to &quot;Yes&quot; which seems crazy, especially in a corporate environment. </p><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2022/12/image.png" class="kg-image" alt="Stop Users Creating Azure AD Tenants" loading="lazy" width="1472" height="1169" srcset="https://www.cyber.engineer/content/images/size/w600/2022/12/image.png 600w, https://www.cyber.engineer/content/images/size/w1000/2022/12/image.png 1000w, https://www.cyber.engineer/content/images/2022/12/image.png 1472w" sizes="(min-width: 720px) 720px"><figcaption>Users can create Azure AD tenants</figcaption></figure><p>This is course gives users Global Admin to that tenant allowing them to do anything they want. </p><p>Flick the switch to &quot;No&quot; to prevent users creating tenants.</p><p>I can see particular security challenges around DLP (data loss prevention) and if users create new tenants, then all that hard work putting security controls in place in the main tenant go out the window. Your SOC team will be blind.</p><p>Hope you enjoyed this quick Azure security tip. Please look out for more!</p>]]></content:encoded></item><item><title><![CDATA[Azure vs GCP vs AWS]]></title><description><![CDATA[Which Cloud? AWS, Azure or GCP? Who is more secure? Who has the best security tooling?]]></description><link>https://www.cyber.engineer/azure-vs-gcp-vs-aws/</link><guid isPermaLink="false">63eccbc7bc298bfdb0904e34</guid><category><![CDATA[aws]]></category><category><![CDATA[azure]]></category><category><![CDATA[gcp]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 10 Aug 2022 11:17:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1569428034239-f9565e32e224?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDI2fHx3aGljaCUyMGNsb3VkfGVufDB8fHx8MTY3NjQ2MzAxNA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1569428034239-f9565e32e224?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDI2fHx3aGljaCUyMGNsb3VkfGVufDB8fHx8MTY3NjQ2MzAxNA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Azure vs GCP vs AWS"><p>Azure, Google Cloud Platform (GCP), and Amazon Web Services (AWS) are the three major cloud service providers. Here are some differences between them:</p><ol><li>Market share: AWS is the largest cloud service provider with the highest market share, followed by Azure and then GCP.</li><li>Pricing and services: Each provider has a different pricing model and a unique set of services, which can make it challenging to compare. However, AWS and GCP offer more services than Azure, while Azure has a broader range of enterprise software integrations and better support for hybrid cloud deployments.</li><li>Support for open source technologies: GCP has a reputation for being more supportive of open source technologies, while Azure and AWS also offer support for open source tools and services.</li><li>Security and compliance: All three providers offer high levels of security and compliance certifications, but Azure and AWS are considered to have stronger security capabilities than GCP.</li><li>Machine learning and artificial intelligence: All three providers offer machine learning and artificial intelligence services, but GCP is known for its expertise in this area and is often considered the best choice for machine learning and data analysis workloads.</li><li>Customer service: AWS and Azure are considered to have better customer service than GCP, with both providers offering 24/7 support and a range of support options, including online chat and phone support.</li></ol><p>Overall, each provider has its strengths and weaknesses, and the best choice depends on your organization&apos;s specific needs and requirements. It&apos;s important to carefully evaluate the features, pricing, and services offered by each provider to determine which one is the best fit for your business.</p><h2 id="whos-more-secure">Who&apos;s more secure?</h2><p>All the major cloud service providers - Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) - have strong security measures in place and are designed to be highly secure. Each provider offers security features such as identity and access management, encryption, network security, and compliance certifications to protect their customers&apos; data.</p><p>The security of your cloud environment also depends on how well you configure and manage it. The provider&apos;s security measures are only one part of the overall security picture. You must also follow security best practices, including proper user access management, secure application design, and network security measures.</p><p>Ultimately, the most secure cloud provider for your organization depends on your specific needs and requirements. You should evaluate the security features, compliance certifications, and support offered by each provider and choose the one that best meets your organization&apos;s security requirements. It&apos;s also important to ensure that you have skilled personnel who can properly configure and manage your cloud environment to maintain its security.</p><h2 id="which-provider-has-the-best-security-tooling">Which provider has the best security tooling?</h2><p>Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) have strong native security tooling to help protect their customers&apos; data and applications.</p><p>AWS provides a wide range of native security tooling, including AWS Identity and Access Management (IAM) for user access management, AWS Config for compliance and governance, and Amazon GuardDuty for threat detection. AWS also offers a range of other security services, such as AWS CloudTrail, AWS CloudHSM, and AWS WAF, to help customers secure their cloud environments.</p><p>Azure has a broad range of native security tooling, including Azure Active Directory (AAD) for identity and access management, Microsoft Defender for Cloud (MDC) for threat protection and compliance management, and Microsoft Sentinel for security information and event management. Azure also provides other security services, such as Azure Key Vault for storing and managing cryptographic keys and secrets, and Azure DDoS Protection for preventing distributed denial of service (DDoS) attacks.</p><p>GCP provides several native security tooling options, including GCP Identity and Access Management (IAM) for access management, Cloud Security Command Center for threat detection and security management, and Cloud Data Loss Prevention (DLP) for sensitive data protection. GCP also provides additional security services, such as GCP Key Management Service for secure key storage and management and GCP Firewall Rules for network security.</p><p>Each provider has a unique set of native security tooling, so the best option for your organization will depend on your specific needs and requirements. However, all three providers offer robust native security tooling to help protect their customers&apos; data and applications.</p>]]></content:encoded></item><item><title><![CDATA[Microsoft Cloud Security Expert? These documents are your bibles]]></title><description><![CDATA[Whether you're new or a seasoned cloud security professional in Azure/Microsoft, these are your bibles to carry with you at all times.]]></description><link>https://www.cyber.engineer/microsoft-cloud-security-expert-these-documents-are-your-bible/</link><guid isPermaLink="false">62cec500bc298bfdb0904b15</guid><category><![CDATA[azure]]></category><category><![CDATA[microsoft]]></category><category><![CDATA[security]]></category><category><![CDATA[documenation]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Mon, 18 Jul 2022 22:14:33 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1454165804606-c3d57bc86b40?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDd8fGNsb3VkJTIwc2VjdXJpdHl8ZW58MHx8fHwxNjU4MTgwNTQ2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1454165804606-c3d57bc86b40?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDd8fGNsb3VkJTIwc2VjdXJpdHl8ZW58MHx8fHwxNjU4MTgwNTQ2&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Microsoft Cloud Security Expert? These documents are your bibles"><p>I&apos;ve been having a think about what are the most valuable documents a Microsoft cloud security person should always have in their back pocket... Even if you&apos;re looking to get into this field. Read ahead and take note: </p><blockquote>The Microsoft Cloud Adoption Framework for Azure</blockquote><p>Best practices is key. I&apos;ve already experienced fixing security architecture that didn&apos;t follow best practice. It&apos;s a lot of work and time to rectify... Get it RIGHT the first time so you don&apos;t set yourself up for more (not-fun) work in the future. You might also cause someone else a headache. Let&apos;s not do that. This document is I&apos;d say, a fundamental.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/cloud-adoption-framework/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Microsoft Cloud Adoption Framework for Azure - Cloud Adoption Framework</div><div class="kg-bookmark-description">Proven guidance and best practices that help you confidently adopt the cloud and achieve business outcomes.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">JanetCThomas</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Azure Architecture Center</blockquote><p>Best practices and patterns for building applications on Microsoft Azure. Covering design for cloud, optimising your workloads, choosing the right technologies, devops and much more. Get it right the first time! </p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/architecture/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Azure Architecture Center - Azure Architecture Center</div><div class="kg-bookmark-description">The Azure Architecture Center provides guidance for designing and building solutions on Azure using established patterns and practices.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">bennage</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Microsoft Azure Well-Architected Framework</blockquote><p>This lives within Azure Architecture Center and forms an absolute solid base to work upon. The Azure Well-Architected Framework is a set of guiding tenets that can be used to improve the quality of a workload. Take note of the 5 important pillars that make up this framework.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/architecture/framework/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Microsoft Azure Well-Architected Framework - Azure Architecture Center</div><div class="kg-bookmark-description">Learn about the five pillars of the Azure Well-Architected Framework and how they can produce a high quality, stable, and efficient cloud architecture.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">david-stanford</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Microsoft Sentinel Documentation</blockquote><p>Use cases to get started using this SIEM. Covering all that Sentinel does such as KQL (Kusto), threat intelligence and detection, threat hunting, investgation and response.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/sentinel/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Microsoft Sentinel documentation</div><div class="kg-bookmark-description">This article presents use cases and scenarios to get started using Microsoft Sentinel. See and stop threats before they cause harm, with SIEM reinvented for a modern world. Microsoft Sentinel is your birds-eye view across the enterprise.# Required; article description that is displayed in search res&#x2026;</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">yelevin</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Microsoft Sentinel Documentation - Decision Tree</blockquote><p>Part of the documentation above is the Decision Tree; if you&apos;re designing your Sentinel workspace and CSOC architecture (which I hope you are and not just winging it...) then this will help you. Even for established environments I&apos;ve found this handy when it comes to the possibility of multiple workspaces in other regions.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/sentinel/design-your-workspace-architecture#decision-tree"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Design your Microsoft Sentinel workspace architecture</div><div class="kg-bookmark-description">Use a decision tree to understand how you might want to design your Microsoft Sentinel workspace architecture.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">batamig</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Kusto Query Language (KQL) Overview</blockquote><p>This will bolster your skill set in cloud security. You don&apos;t have to know every single query, but Azure runs on Kusto. You&apos;ll need to know a little and once you know that you can figure things out. It&apos;s very friendly! The operators, statements and functions are worth looking at.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/data-explorer/kusto/query/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Kusto Query Language (KQL) overview- Azure Data Explorer</div><div class="kg-bookmark-description">This article is a general overview of the Kusto Query Language in Azure Data Explorer.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">shsagir</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Zero Trust Implementation Guidance</blockquote><p>As it says on the tin - hugely useful documents for creating a secure environment following Zero Trust principles.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/security/zero-trust/"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Zero Trust Guidance Center</div><div class="kg-bookmark-description">Learn what the Zero Trust security model is and how to implement deployment steps to apply the security architecture in your organization.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">mjcaparas</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Fundamentals Documentation - Zero Trust Security</blockquote><p>This is important and not everyone understands Zero Trust. If you can explain it, you&apos;ll look pretty good and do some decent work.</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/azure/security/fundamentals/zero-trust"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Zero Trust security in Azure</div><div class="kg-bookmark-description">Learn about the guiding principles of Zero Trust and find resources to help you implement Zero Trust.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">TerryLanfear</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><hr><blockquote>Microsoft 365 Security - Deploying Zero Trust for Microsoft 365</blockquote><p>Quite new to me, but after doing some digging I&apos;ve found this section important. It includes an illustration representing the work of deploying Zero Trust capabilities. I think that&apos;s content for another few posts....</p><figure class="kg-card kg-bookmark-card"><a class="kg-bookmark-container" href="https://docs.microsoft.com/en-us/microsoft-365/security/microsoft-365-zero-trust?view=o365-worldwide#deploying-zero-trust-for-microsoft-365"><div class="kg-bookmark-content"><div class="kg-bookmark-title">Microsoft 365 Zero Trust deployment plan</div><div class="kg-bookmark-description">Learn how to deploy Microsoft 365 Zero Trust security into your environment to defend against threats and protect sensitive data.</div><div class="kg-bookmark-metadata"><img class="kg-bookmark-icon" src="https://docs.microsoft.com/favicon.ico" alt="Microsoft Cloud Security Expert? These documents are your bibles"><span class="kg-bookmark-author">Microsoft Docs</span><span class="kg-bookmark-publisher">BrendaCarter</span></div></div><div class="kg-bookmark-thumbnail"><img src="https://docs.microsoft.com/en-us/media/logos/logo-ms-social.png" alt="Microsoft Cloud Security Expert? These documents are your bibles"></div></a></figure><p></p><p>These documents are what I think is important for new and seasoned cloud security folk who work with Microsoft slash Azure. I&apos;m sure when I delve to the darkside (AWS) I&apos;ll do a similar post.</p>]]></content:encoded></item><item><title><![CDATA[Join the Microsoft Cloud Security 
Private Community]]></title><description><![CDATA[Welcome to the Cloud Security Private Community. By signing up for the ongoing program, you will receive access to our NDA roadmap calls, design exercises, surveys, and private previews.]]></description><link>https://www.cyber.engineer/microsoft-cloud-security-private-community/</link><guid isPermaLink="false">62d5ced3bc298bfdb0904b1e</guid><category><![CDATA[microsoft]]></category><category><![CDATA[azure]]></category><category><![CDATA[security]]></category><category><![CDATA[cloud]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Mon, 18 Jul 2022 21:36:07 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1624571395775-253d9666612b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDEyfHxtaWNyb3NvZnR8ZW58MHx8fHwxNjU4MTc5MjQ3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1624571395775-253d9666612b?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDEyfHxtaWNyb3NvZnR8ZW58MHx8fHwxNjU4MTc5MjQ3&amp;ixlib=rb-1.2.1&amp;q=80&amp;w=2000" alt="Join the Microsoft Cloud Security 
Private Community"><p>I&apos;ve just (finally) joined the Microsoft Cloud Security Private Community and I recommend you do to, if you work primarily in Azure and the Microsoft cloud ecosystem. You&apos;re unlikely to get in if you&apos;re not a corporate customer with a signed NDA though.</p><p><strong>What you&apos;ll get:</strong> Future vision, roadmaps and features</p><p>The form will take between 5-10 minutes and private features will be available on the subscriptions that you state, as many as you like, comma-delimited. Near the end of the form it&apos;ll ask you for which subscriptions you&apos;d like the Preview features to be enabled on. If you have sandbox/dev subscriptions I&apos;d recommend using these to begin with.</p><div class="kg-card kg-callout-card kg-callout-card-blue"><div class="kg-callout-emoji">&#x1F4A1;</div><div class="kg-callout-text">Have your tenant ID and subscription IDs to hand</div></div><figure class="kg-card kg-image-card kg-card-hascaption"><img src="https://www.cyber.engineer/content/images/2022/07/image.png" class="kg-image" alt="Join the Microsoft Cloud Security 
Private Community" loading="lazy" width="851" height="1256" srcset="https://www.cyber.engineer/content/images/size/w600/2022/07/image.png 600w, https://www.cyber.engineer/content/images/2022/07/image.png 851w" sizes="(min-width: 720px) 720px"><figcaption>The form will take around 5-10 minutes to fill out</figcaption></figure><p></p><p>Oh, and you&apos;ll be added to a handy community Teams channel!</p><div class="kg-card kg-callout-card kg-callout-card-green"><div class="kg-callout-emoji">&#x1F4BB;</div><div class="kg-callout-text"><strong>The Form:</strong><br><br>Appreciate that this isn&apos;t the most professional web form in the world but it seems to be the way Microsoft do things now...<br><br>https://forms.office.com/Pages/ResponsePage.aspx?id=v4j5cvGGr0GRqy180BHbR-kibZAPJAVBiU46J6wWF_5URDFSWUhYUldTWjdJNkFMVU1LTEU4VUZHMy4u</div></div><p>Hope you enjoy! </p><p></p>]]></content:encoded></item><item><title><![CDATA[Microsoft Security Community - Upcoming Webinars 2022]]></title><description><![CDATA[Some upcoming Microsoft security webinars for May/June/July/August 2022.]]></description><link>https://www.cyber.engineer/microsoft-security-community/</link><guid isPermaLink="false">6284fc081adeaaf78404af86</guid><category><![CDATA[microsoft]]></category><category><![CDATA[security]]></category><category><![CDATA[webinars]]></category><category><![CDATA[sentinel]]></category><dc:creator><![CDATA[Daniel]]></dc:creator><pubDate>Wed, 18 May 2022 14:02:57 GMT</pubDate><media:content url="https://www.cyber.engineer/content/images/2022/05/microsoft-logo-1-.png" medium="image"/><content:encoded><![CDATA[<img src="https://www.cyber.engineer/content/images/2022/05/microsoft-logo-1-.png" alt="Microsoft Security Community - Upcoming Webinars 2022"><p><strong><strong>MAY 24</strong>th</strong> <strong>2022</strong> &#xA0;Microsoft Defender for IoT | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Section 52 - Investigating Malicious Ladder Logic</a></p><p>In this session, our researcher, Maayan, will share some interesting techniques for investigating potentially malicious Ladder Logic code. Maayan will briefly overview the basics of Ladder Logic programming and demonstrate it on our lab equipment.</p><p><strong><strong>MAY 26</strong>th 2022</strong> &#xA0; Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Azure Security Benchmark V3 Workbook</a></p><p>The Azure Security Benchmark workbook is designed to enable Cloud Architects, Security Engineers, and Governance Risk Compliance Professionals to gain situational awareness for cloud security posture and hardening.</p><p><strong><strong>MAY 31</strong>st 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Transforming Data at Ingestion Time in Microsoft Sentinel</a></p><p>The new version of the custom logs API in Log Analytics together with the new pipeline transformation feature open up many new scenarios for Microsoft Sentinel customers, like filtering, masking or tagging. Join this session as we explore these scenarios and show practical examples on how to implement them.</p><p><strong><strong>JUN 2</strong>nd 2022</strong> &#xA0; Diversity in Cybersecurity | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Building Community for Underrepresented Minorities in Cybersecurity</a></p><p>In this session, Roger will share his story on building community, mentorship, and job opportunities for underrepresented minorities in cybersecurity.</p><p><strong><strong>JUN 14</strong>th 2022</strong> &#xA0; Diversity in Cybersecurity | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Connecting Women in Technology</a></p><p>Join this webinar to learn about connecting women in the technology sector through attracting, retaining and promoting programs.</p><p><strong><strong>JUN 16</strong>th 2022<strong> &#xA0; </strong></strong>Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">The Latest Microsoft Defender for Cloud News from RSA</a></p><p>Join us for this webinar to learn more about the latest announcements directly from the Microsoft Defender for Cloud product team, with in-depth feature overviews and demos.</p><p><strong><strong>JUN 21</strong>st 2022<strong> </strong></strong> &#xA0;Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Protect Your Azure Service Layer with Microsoft Defender for ARM &amp; Defender for DNS</a></p><p>Microsoft Defender for Cloud can give you breadth security protection across your Azure resources, in just a few clicks! Find out how through Defender for ARM (Azure Resource Manager) and Defender for DNS!</p><p><strong><strong>JUN 23</strong>rd 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Leverage New and Existing Features to Optimize Costs in Microsoft Sentinel</a></p><p>Join us for this webinar for a recap on pre-existing cost management strategies as well as additional ones supported by a set of recently released product features.</p><p><strong><strong>JUN 28</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Codeless Connector Platform: Create Your Data Connector in Microsoft Sentinel</a></p><p>In this webinar, we will discuss how you can use the Codeless Connector Platform to create custom connectors, connect them and ingest data to Microsoft Sentinel.</p><p><strong><strong>JUN 30</strong>th 2022</strong> &#xA0; Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Protect Your Databases Anywhere with Microsoft Defender for Cloud</a></p><p>Microsoft Defender for Cloud can protect your databases anywhere, including your SQL servers, SQL VMs, Open-source databases, and just recently announced CosmosDB! Find out why protecting the data in your databases is so crucial, and see a demo for how to secure your databases!</p><p><strong><strong>JUL 12</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Zero Trust (TIC 3.0) Solution</a></p><p>The Microsoft Sentinel Zero Trust (TIC 3.0) Solution provides a mechanism for viewing log queries aligned to Zero Trust and Trusted Internet Connections models across the Microsoft and partner ecosystem. This solution enables governance and compliance teams to design, build, monitor, and respond to Zero Trust (TIC 3.0) requirements across 25+ Microsoft and 3rd party products.</p><p><strong><strong>JUL 14</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Cyber Threat Intelligence Demystified in Microsoft Sentinel</a></p><p>In this webinar, we will provide an overview of Microsoft Sentinel threat intelligence capabilities and demonstrate how Microsoft Sentinel allows you to bring in this threat intelligence into its ecosystem and use it to find actionable threats, investigation, and hunting.</p><p><strong><strong>JUL 19</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">What&#x2019;s New in the Last 3 Months</a></p><p>(Microsoft Defender for Cloud) is in active development and receives improvements on an ongoing basis. In this session we will summarize and demo what we&apos;ve released for Microsoft Defender for Cloud in the last 3 months that you need to know about!</p><p><strong><strong>JUL 20</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Defender for IoT | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Securing Critical Networks Through Defender for IoT and Horizon DPI</a></p><p>Deep packet inspection in the Defender for IoT platform can be easily extended by developing plug-ins that use the Horizon ODE for deep packet inspection. A patent has been granted to Microsoft for innovative, ICS-aware threat analytics and machine learning algorithms relating to OT/IoT/ICS security.</p><p><strong><strong>JUL 21</strong>st 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Microsoft Sentinel Fusion: New Detection Capabilities &amp; Features Explained</a></p><p>In this webinar, we will cover: New Fusion detection capabilities including Insider Threat and Data Exfiltration. After this session, you will have a deeper appreciation of how prevalent Insider Threat and Data Exfiltration attacks are and how Fusion can enable you to detect such attacks that would otherwise be difficult to catch. The new Fusion health metrics that helps you to validate whether Fusion is working as expected, from processing alerts and anomalies to creating incidents. The supervised scoring model we recently added to further improve Fusion&#x2019;s detection accuracy.</p><p><strong><strong>JUL 26</strong>th 2022<strong> </strong></strong> &#xA0;Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Improving Your Security Posture with Policy Enforcement and Governance</a></p><p>Are you struggling to understand, how to ensure the security posture of your environment does not start deteriorating again or how to apply guardrails at the beginning of the deployment phase of every service in Azure? Come join us to learn how Defender for Cloud and Azure Policies work together to help you improve your security posture with policy enforcement &amp; Governance.</p><p><strong><strong>JUL 28</strong>th 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">IT/OT Threat Monitoring Solution</a></p><p>There has been a long-standing split between ICS/SCADA (OT) and Corporate (IT) cybersecurity. This split was often driven by significant differences in technology/tooling. Microsoft Defender for IoT&apos;s integration with Microsoft Sentinel drives convergency by providing a single pane for coverage of both D4IOT (OT) and Microsoft Sentinel (IT) alerting. This solution includes Workbooks and Analytics rules providing a guide OT detection and Analysis.</p><p><strong><strong>AUG 4</strong>th 2022</strong> &#xA0; Microsoft Defender for Cloud | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">How to Ensure Maximum Security Posture For Your Government Cloud Environment and How to Protect It U...</a></p><p>In this session, we will present Microsoft Defender for Cloud and how it allows Azure Government Cloud customers to properly secure their environments, either in the cloud or on-premises.</p><p><strong><strong>AUG 11</strong>th 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Building on Microsoft Sentinel Platform</a></p><p>Microsoft Sentinel is a cloud-native SIEM, enabling enterprises to collect, correlate, and analyze data at cloud speed. Join us in this session to get the most recent updates on Microsoft Sentinel solutions, learn how to create new codeless connectors in Microsoft Sentinel and build your very own Microsoft Sentinel solution. Also learn how you can contribute to the new unified SIEM + XDR GitHub repository to add value to Microsoft Sentinel and Microsoft Defender.</p><p><strong><strong>AUG 16</strong>th 2022</strong> &#xA0; Microsoft Sentinel | <a href="https://aka.ms/WebRegForm5" rel="noopener noreferrer">Cybersecurity Maturity Model Certification (CMMC) 2.0 Solution</a></p><p>This solution enables Compliance Teams, Architects, SecOps Analysts, and Consultants to gain situational awareness for cloud workload security posture. This solution is designed to augment staffing through automation, visibility, assessment, monitoring and remediation.</p><p></p><p>Courtesy or <a href="https://techcommunity.microsoft.com/t5/security-compliance-and-identity/join-our-security-community/ba-p/927888">https://techcommunity.microsoft.com/t5/security-compliance-and-identity/join-our-security-community/ba-p/927888</a> </p>]]></content:encoded></item></channel></rss>