Security Talk: Windows Azure Security - A Peek Under the Hood
Windows Azure uses a large, homogeneous, shared-hardware computing base to host a diverse collection of customer applications that are exposed to users from the Internet. And it's all built on top of Windows. How could that possibly be secure?
In this installment of the Security Talk webcast series, Charlie Kaufman describes how the Azure software is structured to accept software and configuration requests from customers, deploy the software within virtual machines, and allocate storage and database resources to hold a persistent state—all while maintaining a minimal attack surface and several layers of defense in depth. Charlie also helps you evaluate how Azure security compares with systems operated on a customer's premises.
Duration: 50 minutes
[ 1:06 ] How is Windows Azure structured to help minimize the attack surface?
[ 15:20 ] How does Windows Azure deal with attacks by an "unruley" tenant?
[ 31:38 ] How does Windows Azure deal with attacks by an end user?
Check out the Windows Azure subscription options at http://bit.ly/TryAzure
Published Date: August 19, 2010
Presented By: David Tesar
Tags: TechNet Edge , David Tesar , Zune , iPod , Security , Azure , Security-Talk-Series , charlie-kaufman , Videos , HomePage