Skip to main content

Securing the Enterprise with Arc

  • Chapter
  • First Online:
Azure Arc Systems Management
  • 52 Accesses

Abstract

The impact of enterprise security failures is increasing as tolerance for missteps decreases. Countless breaches of consumer data have often been met with token fines and pats on the head to injured users in the form of a year or two of credit monitoring, a tepid remedy that in no way resolves the situation for those whose identity was actually misused. As failures begin to impact national security and the internal workings of large corporations though, the reaction is becoming more proportionate. The now famous SolarWinds failure to protect corporate and government consumers of its security tools is resulting in lawsuits. A November 2021 suit filed against SolarWinds board by two pension funds accuses SolarWinds of failures that are patently ridiculous for a company purporting to provide IT security, such as using “solarwinds123” as a network password.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://news.bloomberglaw.com/employee-benefits/solarwinds-board-sued-by-pension-funds-over-massive-cyberattack

  2. 2.

    www.linkedin.com/in/yaronrl/

  3. 3.

    www.justice.gov/usao-sdny/press-release/file/1452706/download

  4. 4.

    https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles.html

  5. 5.

    https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/service-accounts-managed-identities

  6. 6.

    https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/hybrid/arc-enabled-servers/eslz-identity-and-access-management

  7. 7.

    www.wired.com/2008/07/sf-city-charged/

  8. 8.

    www.infoworld.com/article/2653004/why-san-francisco-s-network-admin-went-rogue.html

  9. 9.

    https://gizmodo.com/kevin-mitnick-famous-hacker-dies-at-59-1850659160

  10. 10.

    https://pages.nist.gov/800-63-3/

  11. 11.

    www.nist.gov/blogs/cybersecurity-insights/questionsand-buzz-surrounding-draft-nist-special-publication-800-63-3

  12. 12.

    www.zscaler.com/resources/security-terms-glossary/what-is-sase

  13. 13.

    www.imdb.com/title/tt0099785/

  14. 14.

    www.ibm.com/downloads/cas/DB4GL8YM and www.ibm.com/downloads/cas/E3G5JMBP

  15. 15.

    www.fortinet.com/resources-campaign/cloud/2023-cloud-security-report

  16. 16.

    www.akamai.com/resources/state-of-the-internet/2023-year-review

  17. 17.

    www.csoonline.com/article/651075/new-research-reveals-most-attacked-vulnerable-assets.html

  18. 18.

    https://learn.microsoft.com/en-us/azure/sentinel/overview

  19. 19.

    https://www.paloaltonetworks.com/cyberpedia/what-is-soar-vs-siem

  20. 20.

    https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/microsoft-is-named-a-leader-in-the-2022-gartner-magic-quadrant/ba-p/3666566

  21. 21.

    https://resources.infosecinstitute.com/certification/the-cissp-cbk-domains-info-and-updates/

  22. 22.

    www.ey.com/en_us/tax/global-tax-platform (one example, see video for clarity)

  23. 23.

    https://learn.microsoft.com/en-us/azure/lighthouse/how-to/onboard-management-group#register-the-resource-provider-across-subscriptions

  24. 24.

    https://docs.microsoft.com/en-us/azure/lighthouse/concepts/architecture

  25. 25.

    https://docs.microsoft.com/en-us/azure/lighthouse/concepts/cross-tenant-management-experience#enhanced-services-and-scenarios

  26. 26.

    https://docs.microsoft.com/en-us/azure/azure-monitor/logs/private-link-design#plan-by-network-topology

  27. 27.

    www.networkworld.com/article/3268449/what-is-dns-and-how-does-it-work.html

  28. 28.

    https://docs.microsoft.com/en-us/security/benchmark/azure/overview

  29. 29.

    www.cisecurity.org/cis-benchmarks

  30. 30.

    https://csrc.nist.gov/projects/role-based-access-control/faqs

  31. 31.

    www.onelogin.com/learn/least-privilege-polp

  32. 32.

    https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/custom-overview

  33. 33.

    www.commerce.senate.gov/services/files/24d3c229-4f2f-405d-b8db-a3a67f183883

  34. 34.

    https://learn.microsoft.com/en-us/entra/id-governance/privileged-identity-management/pim-how-to-add-role-to-user

  35. 35.

    https://journeyofthegeek.com/2021/06/12/experimenting-with-azure-arc/

  36. 36.

    https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/service-accounts-governing-azure

  37. 37.

    www.f5.com/labs/articles/education/securing-apis--10-best-practices-for-keeping-your-data-and-infra see footnotes directly in article for company scenarios listed

  38. 38.

    www.gartner.com/en/webinars/4002323/api-security-protect-your-apis-from-attacks-and-data-breaches

  39. 39.

    https://owasp.org/www-project-api-security/

  40. 40.

    https://azure.microsoft.com/en-us/services/api-management/#overview

  41. 41.

    https://docs.microsoft.com/en-us/azure/api-management/self-hosted-gateway-overview

  42. 42.

    https://learn.microsoft.com/en-us/azure/api-management/how-to-deploy-self-hosted-gateway-azure-arc

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to APress Media, LLC, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Maxwell, R. (2024). Securing the Enterprise with Arc. In: Azure Arc Systems Management. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-9480-2_4

Download citation

Publish with us

Policies and ethics