dc.contributorMoreira, Fernando Manuel Araújo
dc.contributorhttp://lattes.cnpq.br/1809254923092721
dc.creatorCandido, Gabriel Donizeti
dc.date.accessioned2023-04-11T15:34:27Z
dc.date.accessioned2023-09-04T20:26:41Z
dc.date.available2023-04-11T15:34:27Z
dc.date.available2023-09-04T20:26:41Z
dc.date.created2023-04-11T15:34:27Z
dc.date.issued2023-04-04
dc.identifierCANDIDO, Gabriel Donizeti. Uma revisão de melhores práticas de segurança na Azure. 2023. Trabalho de Conclusão de Curso (Graduação em Engenharia Física) – Universidade Federal de São Carlos, São Carlos, 2023. Disponível em: https://repositorio.ufscar.br/handle/ufscar/17685.
dc.identifierhttps://repositorio.ufscar.br/handle/ufscar/17685
dc.identifier.urihttps://repositorioslatinoamericanos.uchile.cl/handle/2250/8630321
dc.description.abstractThe text deals with information security concepts from the cloud point of view and uses Azure as an example provider. The definitions of infrastructure, platform and software services are contextualized, with examples based on the chosen provider, such as virtual machines, SQL databases and Web application services. are also presented introductory concepts about information security, such as security frameworks and the main types of cyber attacks following the list of OWASP, a worldwide organization for application security. And joining the concepts of cloud with security, some features offered by Azure to protect cloud applications are illustrated. As an application of the concepts, an architecture of a real project and its description “as is” are presented. The project deals with a data flow involving Azure Data Factory, Azure Databricks, Azure Storage Account, SQL Server, APP Service and other cloud resources. An analysis is carried out from the security point of view, and then a solution proposal is presented to resolve the flawed points. The main points presented as a solution are the use of isolated virtual networks, with strategic exposures on the internet through the Azure Application Gateway and the Azure VPN Gateway, as well as the use of a firewall such as the Web Application Firewall (WAF), the use of identity management like Azure Active Directory (AAD), and secrets management like Azure Key Vault. Finally, it is concluded that the redundancy of security policies contributes to the creation of a safer cloud solution, and that isolating the internet environment using virtual networks and applying Firewall policies and minimum access policies makes it difficult for intruders to access . It is also concluded that when provisioning a cloud solution, a large part of the responsibility is shared with the provider, which already has very well tested and validated security solutions and, therefore, reduces the risks of hacking.
dc.languagepor
dc.publisherUniversidade Federal de São Carlos
dc.publisherUFSCar
dc.publisherCâmpus São Carlos
dc.publisherEngenharia Física - EFi
dc.rightshttp://creativecommons.org/licenses/by-nc-nd/3.0/br/
dc.rightsAttribution-NonCommercial-NoDerivs 3.0 Brazil
dc.subjectAzure
dc.titleUma revisão de melhores práticas de segurança na Azure
dc.typeTCC


Este ítem pertenece a la siguiente institución