Please enable JavaScript.
Coggle requires JavaScript to display documents.
Microsoft Azure
Solution Architecture
http://bit.ly/2hZC4w4…
Availability
-
Patterns
Health Endpoint Monitoring
Implement functional checks in an application that external tools can access through exposed endpoints at regular intervals.
Documentation
Queue-Based Load Leveling
Use a queue that acts as a buffer between a task and a service that it invokes in order to smooth intermittent heavy loads.
Documentation
Throttling
Control the consumption of resources used by an instance of an application, an individual tenant, or an entire service.
Documentation
Security
Patterns
Federated Identity
Delegate authentication to an external identity provider.
Documentation
Gatekeeper
Protect applications and services by using a dedicated host instance that acts as a broker between clients and the application or service, validates and sanitizes requests, and passes requests and data between them.
Documentation
Valet Key
Use a token or key that provides clients with restricted direct access to a specific resource or service.
Documentation
-
Data Collection
and Storage
Documentation
-
-
-
SEC 5: Use Client-side encryption to secure data that you send to storage accounts when you require sole control of encryption keys.
SEC 6: Use Storage Service Encryption (SSE) to automatically encrypt data in Azure Storage, and Azure Disk Encryption to encrypt virtual machine disk files for the OS and data disks.
SEC 7: Use Azure Storage Analytics to monitor authorization type; like with Blob Storage, you can see if users have used a Shared Access Signature or the storage account keys.
-
Security Policies
and Recommendations
Documentation
-
-
-
SEC 12: Apply security contact details for your Azure subscription; this the Microsoft Security Response Centre (MSRC) contacts you if it discovers that your customer data has been accessed by an unlawful or unauthorized party.
Identity and
Access Management
Documentation
SEC 13: Synchronize your on-premises directory with your cloud directory using Azure AD.
SEC 14: Use Single Sign-On to enable users to access their SaaS applications based on their organizational account in Azure AD.
-
-
-
-
Ongoing Security
Monitoring
Documentation
SEC 19: Use Malware Assessment Solution Log Analytics to report on the status of anti-malware protection in your infrastructure.
SEC 20: Use Update assessment to determine the overall exposure to potential security problems, and whether or how critical these updates are for your environment.
SEC 21: The Identity and Access provide you an overview of user
- user identity state,
- number of failed attempts to log on,
- the user’s account that were used during those attempts, accounts that were locked out
- accounts with changed or reset password
- Currently number of accounts that are logged in.
Azure Security Center
detection capabilities
Documentation
-
-
-
SEC 25: Use Anomaly detection that uses statistical profiling to build a historical baseline.
SEC 26: Infrastructure as Code (IaC) is a practice, which enables the automation and validation of creation and teardown of networks and virtual machines to help with delivering secure, stable application hosting platforms.
-
SEC 28: Release Management - Manage automated deployments through each stage of your pipeline.
SEC 30: Using Load Testing & Auto-Scale we can find performance problems in our app to improve deployment quality and to make sure our app is always up or available to cater to the business needs.
SEC 29: App Performance Monitoring of running applications including production environments for application health as well as customer usage help organizations form a hypothesis and quickly validate or disprove strategies.
-
Resiliency
Patterns
Bulkhead
Isolate elements of an application into pools so that if one fails, the others will continue to function.
Documentation
Circuit Breaker
Handle faults that might take a variable amount of time to fix when connecting to a remote service or resource.
Documentation
Compensating Transaction
Undo the work performed by a series of steps, which together define an eventually consistent operation.
Documentation
Health Endpoint Monitoring
Implement functional checks in an application that external tools can access through exposed endpoints at regular intervals.
Documentation
Leader Election
Coordinate the actions performed by a collection of collaborating task instances in a distributed application by electing one instance as the leader that assumes responsibility for managing the other instances.
Documentation
Queue-based Load Leveling
Use a queue that acts as a buffer between a task and a service that it invokes in order to smooth intermittent heavy loads.
Documentation
Retry
Enable an application to handle anticipated, temporary failures when it tries to connect to a service or network resource by transparently retrying an operation that's previously failed.
Documentation
Scheduler Agent Supervisor
Coordinate a set of actions across a distributed set of services and other remote resources.
Documentation
Requirements
RESL 1: Define your customer's availability requirements.
-
-
Security
RESL 20: Implement application-level protection against distributed denial of service (DDoS) attacks.
-
-
-
Operations
-
-
-
-
RESL 34: Ensure that more than one person on the team is trained to monitor the application and perform any manual recovery steps.
-
-
-
-
-
-
-
-
RESL 43: Ensure that your application doesn't exceed the scalability targets for virtual machine disks.
-
-
Azure Services
-
-
-
Azure Storage
-
-
RESL 70: For Queue storage, create a backup queue in another region.
-
-
-
-
Virtual Machines
-
-
-
-
-
RESL 87: Install applications on a data disk, not the OS disk.
-
-
-
Virtual Network
RESL 91: To whitelist or block public IP addresses, add an NSG to the subnet.
-
-
-
Management,
Monitoring,
and DevOps
Patterns
Ambassador
Create helper services that send network requests on behalf of a consumer service or application.
Documentation
Anti-Corruption Layer
Implement a façade or adapter layer between a modern application and a legacy system.
Documentation
External Configuration Store
Move configuration information out of the application deployment package to a centralized location.
Documentation
Gateway Aggregation
Use a gateway to aggregate multiple individual requests into a single request.
Documentation
Gateway Offloading
Offload shared or specialized service functionality to a gateway proxy.
Documentation
Gateway Routing
Route requests to multiple services using a single endpoint.
Documentation
Health Endpoint Monitoring
Implement functional checks in an application that external tools can access through exposed endpoints at regular intervals.
Documentation
Sidecar
Deploy components of an application into a separate process or container to provide isolation and encapsulation.
Documentation
Strangler
Incrementally migrate a legacy system by gradually replacing specific pieces of functionality with new applications and services.
Documentation
-
Development
-
MGMT 12: Ensure that all authorized team members can provision infrastructure and deploy the application
-
-
-
-
-
-
-
-
-