SlideShare a Scribd company logo
Presented by:
Ammar Hasayen | MS MVP
CISSP | Cybersecurity
http://ahasayen.com
CLOUD REFERENCE
ARCHITECTURE
PART 1 - FOUNDATION
Date: 9Th November 2019
Available on SlideShare &
YouTube
|
@ammarhasaye
n
About Me: http://ahasayen.com
Blog: http://blog.ahasayen.com
Social Media: @ammarhasayen
Microsoft MVP | Pluralsight Author | Blogger
Book Author
AMMAR HASAYEN
CISSP | CISM | AWS Architect | Azure Security Engineer | M365 Security Engineer
Cloud Migration
Handbook Vol. 1
Now available!
Authored by Jose A. Hernandez, myCloudDoor CTO,
Ammar Hasayen, a recognized worldwide expert on
cybersecurity and Javier Aguado, myCloudDoor
Cloud Services Director
https://me.ahasayen.com/cloud-migration/
OVERVIEW
Move to the cloud
– Agility and speed of delivery
– Governance and security
Cloud Reference Architecture
– ISO/IEC 17789:2014
Azure cloud computing
Audience
– Cloud architects
– Security professionals
– Any organization moving to the cloud
Introduction
The biggest blockers for
organizations to adopt cloud first
strategy are Security and
Compliance
CEO of AvaLAN Wireless, warns
that the United States next Pearl
Harbor will be cyber-attack
According to a recent Gartner
report, it is most likely that 95% of
cloud security failures will be the
customer’s fault
Just think about these facts for a
moment
Cloud Reference Architecture - Part 1 Foundation
Security &
ComplianceCloud Agility
ExtendTrust
Builder Blueprint
Blueprint
Cloud
Reference
Architecture
(CRA)
The Need For Cloud Reference
Architecture
Cloud Reference Architecture also known as CRA
Large-Scale
Workloads
Development
Environment
Testing and Exploring
Journey To The Cloud
Islands
Workload islands that are
managed separately
Cost
Managing cost of running workloads in
the cloud becomes a challenge
The End Result
Governance
Challenges
Automation Security models
Data Sovereignty
Cloud Reference Architecture - Part 1 Foundation
The Benefits of Cloud Reference
Architecture
Cloud reference architecture (CRA) helps organizations
address the need for detailed, modular and current architecture
guidance for building solutions in the cloud
CRA
Design Patterns
Guidance
CRA
Cloud Reference Architecture CRA
Deploy Workloads
User View
Functional
View
Implementation
View
Deployment
View
The ISO/IEC 17789 CRA defines four
different views:
1. User View
2. Functional View
3. Implementation View
4. Deployment View
Deployment View
- Framework for all cloud deployments.
- Reduce design effort
- Blueprint for all cloud projects.
• Quickly deploy workloads.
• Reduce complexity.
• Reduce Risk.
The Need for Enterprise Scaffold
Cost Management Layer
Governance Layer
Security Layer
Trust Layer
CRA
Deploy Resources
Engineers build a building
- Creating basis of the structure
(Scaffold)
- Provides anchor points of more
permanent systems to be mounted
https://bit.ly/2ZdYZIA
Enterprise Scaffold
Resources deployed in the cloud:
- Meet minimum security and governance
practices.
- Enable developers to deploy applications
quickly.
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
Enterprise Scaffold
BusinessContinuity
Monitoring&Logging
Enterprise Structure
Deployment Essentials
Core Networking
Resource Governance
Deploy Workloads
Security & Compliance
Management Hierarchy
Naming Convention Data Sovereignty
Templates
Automations
BlueprintsInfrastructure as a Code
Hybrid Connections Hub-Spoke IP Addressing DMZ
Firewalls & NSGs UDR VNET Peering Name Resolution
Resource Tagging Cost Management Azure Locks Azure Policies
LOB Workspaces DevOps Pipelines Versioning Shared Services
Secure DevOps Toolkit Patching Azure PIM Identity & RBAC
VNET Service Points DDoS Incident Response Security Center
Enterprise Hierarchy Accountability Subscriptions Resource Groups
SUMMARY
What is the purpose of CRA
Balancing security & governance with agility &
speed of delivery
The need for ‘Enterprise Scaffold’ as a
framework to achieve that balance.
References
• ISO/IEC 17789:2014: Cloud computing - Reference architecture
https://www.iso.org/standard/60545.html
• Azure Enterprise Scaffold
https://docs.microsoft.com/en-us/azure/architecture/cloud-adoption/appendix/azure-
scaffold
• My Cloud Migration Handbook Vol. 1
http://me.ahasayen.com/cloud-migration
CHECK THE VIDEO
DESCRIPTION BELOW
PLEASE SHARE YOUR FEEDBACK ON ONE OF MY SOCIAL CHANNELS
@ammarhasayen
Let Me Know Your Feedback
YOU CAN ACCESS THE SLIDES FROM SlideShare @ammarhasayen
Thank You For Your Time
CONNECT ON
SOCIAL MEDIA
@ammarhasayen
CHECK OUT
MY BLOG
http://blog.ahasayen.com
CHECK OUT
MYCOURSES IN
PLURALSIGHT
https://www.pluralsight.com/authors/ammar-hasayen
Cloud Migration
Handbook Vol. 1
Now available!
Authored by Jose A. Hernandez, myCloudDoor CTO,
Ammar Hasayen, a recognized worldwide expert on
cybersecurity and Javier Aguado, myCloudDoor
Cloud Services Director
https://me.ahasayen.com/cloud-migration/
AMMAR HASAYEN
@ammarhasayen

More Related Content

What's hot (20)

PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Timothy McAliley
 
PPTX
Introduction to Azure DevOps
Lorenzo Barbieri
 
PDF
Azure 101
Korry Lavoie
 
PDF
Azure cloud migration simplified
Girlo
 
PPTX
Azure Express Route
Mustafa
 
PPTX
Azure Governance
Benjamin Hüpeden
 
PPTX
Microsoft Azure Networking Basics
Sai Kishore Naidu
 
PPTX
Azure Sentinel.pptx
Mohit Chhabra
 
PPTX
Lets talk about: Azure Kubernetes Service (AKS)
Pedro Sousa
 
PDF
Introduction to Azure
Robert Crane
 
PPTX
Terraform on Azure
Julien Corioland
 
PPTX
Let's Talk About: Azure Networking
Pedro Sousa
 
PPTX
48. Azure Active Directory - Part 1
Shawn Ismail
 
PDF
TechnicalTerraformLandingZones121120229238.pdf
MIlton788007
 
PPTX
Azure Security Overview
Allen Brokken
 
PPTX
Azure Migration Program Pitch Deck
Nicholas Vossburg
 
PDF
Mastering Azure Monitor
Richard Conway
 
PPTX
Azure Networking - The First Technical Challenge
Aidan Finn
 
PDF
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
SlideTeam
 
PPTX
Azure virtual network
Lalit Rawat
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Timothy McAliley
 
Introduction to Azure DevOps
Lorenzo Barbieri
 
Azure 101
Korry Lavoie
 
Azure cloud migration simplified
Girlo
 
Azure Express Route
Mustafa
 
Azure Governance
Benjamin Hüpeden
 
Microsoft Azure Networking Basics
Sai Kishore Naidu
 
Azure Sentinel.pptx
Mohit Chhabra
 
Lets talk about: Azure Kubernetes Service (AKS)
Pedro Sousa
 
Introduction to Azure
Robert Crane
 
Terraform on Azure
Julien Corioland
 
Let's Talk About: Azure Networking
Pedro Sousa
 
48. Azure Active Directory - Part 1
Shawn Ismail
 
TechnicalTerraformLandingZones121120229238.pdf
MIlton788007
 
Azure Security Overview
Allen Brokken
 
Azure Migration Program Pitch Deck
Nicholas Vossburg
 
Mastering Azure Monitor
Richard Conway
 
Azure Networking - The First Technical Challenge
Aidan Finn
 
Devops Strategy Roadmap Lifecycle Ppt Powerpoint Presentation Slides Complete...
SlideTeam
 
Azure virtual network
Lalit Rawat
 

Similar to Cloud Reference Architecture - Part 1 Foundation (20)

PPTX
Azure_Cloud_Foundations_Presentation.pptx
fredsonbarbosa1
 
PPTX
Azure_Cloud_Foundations_Foundations_Focused.pptx
fredsonbarbosa1
 
PPTX
Brk30176 enterprise class networking in azure
Abou CONDE
 
PDF
Azure Arcの様々なパターンを図で理解する!
Masahiko Ebisuda
 
PDF
Microsoft Azure Fundamentals AZ 900 ####
MohanArumugam24
 
PDF
Microsoft Azure For Solutions Architects
Roy Kim
 
PDF
Comprehensive Guide to Azure Cloud Services_ Features, Benefits, and Use Case...
unicloudm
 
PPTX
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Aidan Finn
 
PPTX
Cloud Meetup - Automation in the Cloud
petriojala123
 
PPTX
Charla Azure TLF.pptx
Juan Garcia
 
PPTX
Trust No-One Architecture For Services And Data
Aidan Finn
 
PPTX
dsfsdfsdfsdddddddddddddddddddddddffffffffff
fredsonbarbosa1
 
PPTX
Cloud1 Computing 01
Heartin Jacob
 
PPTX
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Jeremy Gray
 
PDF
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Predica Group
 
PDF
Microsoft Azure Cloud Services
David J Rosenthal
 
PPTX
Overview of Enterprise-scale landing zones using Cloud Adoption Framework Rea...
MarceloMiranda38200
 
PDF
AZ-900 Microsoft Azure Fundamentals Summary.pdf
OlivierLumeau1
 
PPTX
Fundamentals of Microsoft Azure: AZ-900
ArmanKukreti
 
PDF
AZ-900 Azure Fundamentals.pdf
ssuser5813861
 
Azure_Cloud_Foundations_Presentation.pptx
fredsonbarbosa1
 
Azure_Cloud_Foundations_Foundations_Focused.pptx
fredsonbarbosa1
 
Brk30176 enterprise class networking in azure
Abou CONDE
 
Azure Arcの様々なパターンを図で理解する!
Masahiko Ebisuda
 
Microsoft Azure Fundamentals AZ 900 ####
MohanArumugam24
 
Microsoft Azure For Solutions Architects
Roy Kim
 
Comprehensive Guide to Azure Cloud Services_ Features, Benefits, and Use Case...
unicloudm
 
Microsoft Azure Hybrid Cloud - Getting Started For Techies
Aidan Finn
 
Cloud Meetup - Automation in the Cloud
petriojala123
 
Charla Azure TLF.pptx
Juan Garcia
 
Trust No-One Architecture For Services And Data
Aidan Finn
 
dsfsdfsdfsdddddddddddddddddddddddffffffffff
fredsonbarbosa1
 
Cloud1 Computing 01
Heartin Jacob
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Jeremy Gray
 
Cloud Governance & DevOps: Must-have Tools on Your Journey to Azure Cloud
Predica Group
 
Microsoft Azure Cloud Services
David J Rosenthal
 
Overview of Enterprise-scale landing zones using Cloud Adoption Framework Rea...
MarceloMiranda38200
 
AZ-900 Microsoft Azure Fundamentals Summary.pdf
OlivierLumeau1
 
Fundamentals of Microsoft Azure: AZ-900
ArmanKukreti
 
AZ-900 Azure Fundamentals.pdf
ssuser5813861
 
Ad

More from Ammar Hasayen (20)

PPTX
UAE Microsoft MVPs - How To become Microsoft MVP
Ammar Hasayen
 
PPTX
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Ammar Hasayen
 
PPTX
Introducing Azure Bastion
Ammar Hasayen
 
PPTX
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Ammar Hasayen
 
PPTX
Windows Advance Threats - BSides Amman 2019
Ammar Hasayen
 
PPTX
The Emerge Of The Modern Workplace
Ammar Hasayen
 
PPTX
How to plan your Modern Workplace Project - SPS Denver October 2018
Ammar Hasayen
 
PPTX
Secure Modern Workplace With Microsoft 365 Threat Protection
Ammar Hasayen
 
PDF
Microsoft Cloud App Security CASB
Ammar Hasayen
 
PPTX
Office 365 periodic table - editable
Ammar Hasayen
 
PDF
Migrating your certification authority hashing algorithm from sha 1 to sha-2
Ammar Hasayen
 
PDF
Strict KDC Validation
Ammar Hasayen
 
PPTX
Microsoft 365 Threat Management and security - EMS E5
Ammar Hasayen
 
PDF
Modern Workplace Deep Dive infographic
Ammar Hasayen
 
PDF
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Ammar Hasayen
 
PDF
Email edge security architecture EOP
Ammar Hasayen
 
PPTX
Era of disruption with Microsoft 365
Ammar Hasayen
 
PPTX
What is microsoft 365
Ammar Hasayen
 
PDF
Exchange Online Protection EOP headers
Ammar Hasayen
 
PDF
Malware and malicious programs
Ammar Hasayen
 
UAE Microsoft MVPs - How To become Microsoft MVP
Ammar Hasayen
 
Virtual Data Center VDC - Azure Cloud Reference Architecture CRA
Ammar Hasayen
 
Introducing Azure Bastion
Ammar Hasayen
 
Microsoft 365 Certification - How to become Enterprise Administrator Expert
Ammar Hasayen
 
Windows Advance Threats - BSides Amman 2019
Ammar Hasayen
 
The Emerge Of The Modern Workplace
Ammar Hasayen
 
How to plan your Modern Workplace Project - SPS Denver October 2018
Ammar Hasayen
 
Secure Modern Workplace With Microsoft 365 Threat Protection
Ammar Hasayen
 
Microsoft Cloud App Security CASB
Ammar Hasayen
 
Office 365 periodic table - editable
Ammar Hasayen
 
Migrating your certification authority hashing algorithm from sha 1 to sha-2
Ammar Hasayen
 
Strict KDC Validation
Ammar Hasayen
 
Microsoft 365 Threat Management and security - EMS E5
Ammar Hasayen
 
Modern Workplace Deep Dive infographic
Ammar Hasayen
 
Microsoft EMS Enterprise Mobility and Security Architecture Poster
Ammar Hasayen
 
Email edge security architecture EOP
Ammar Hasayen
 
Era of disruption with Microsoft 365
Ammar Hasayen
 
What is microsoft 365
Ammar Hasayen
 
Exchange Online Protection EOP headers
Ammar Hasayen
 
Malware and malicious programs
Ammar Hasayen
 
Ad

Recently uploaded (20)

DOCX
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
PDF
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
PDF
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
DOCX
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
PDF
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
PDF
Staying Human in a Machine- Accelerated World
Catalin Jora
 
PPTX
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
PDF
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
PDF
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
PDF
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
PPTX
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
PDF
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
PDF
How do you fast track Agentic automation use cases discovery?
DianaGray10
 
Cryptography Quiz: test your knowledge of this important security concept.
Rajni Bhardwaj Grover
 
[Newgen] NewgenONE Marvin Brochure 1.pdf
darshakparmar
 
“Voice Interfaces on a Budget: Building Real-time Speech Recognition on Low-c...
Edge AI and Vision Alliance
 
Python coding for beginners !! Start now!#
Rajni Bhardwaj Grover
 
“Computer Vision at Sea: Automated Fish Tracking for Sustainable Fishing,” a ...
Edge AI and Vision Alliance
 
Staying Human in a Machine- Accelerated World
Catalin Jora
 
Future Tech Innovations 2025 – A TechLists Insight
TechLists
 
NLJUG Speaker academy 2025 - first session
Bert Jan Schrijver
 
UPDF - AI PDF Editor & Converter Key Features
DealFuel
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
Designing_the_Future_AI_Driven_Product_Experiences_Across_Devices.pptx
presentifyai
 
NASA A Researcher’s Guide to International Space Station : Physical Sciences ...
Dr. PANKAJ DHUSSA
 
Mastering ODC + Okta Configuration - Chennai OSUG
HathiMaryA
 
CIFDAQ Market Wrap for the week of 4th July 2025
CIFDAQ
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
LOOPS in C Programming Language - Technology
RishabhDwivedi43
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
AI Agents in the Cloud: The Rise of Agentic Cloud Architecture
Lilly Gracia
 
How do you fast track Agentic automation use cases discovery?
DianaGray10
 

Cloud Reference Architecture - Part 1 Foundation

  • 1. Presented by: Ammar Hasayen | MS MVP CISSP | Cybersecurity http://ahasayen.com CLOUD REFERENCE ARCHITECTURE PART 1 - FOUNDATION Date: 9Th November 2019 Available on SlideShare & YouTube | @ammarhasaye n
  • 2. About Me: http://ahasayen.com Blog: http://blog.ahasayen.com Social Media: @ammarhasayen Microsoft MVP | Pluralsight Author | Blogger Book Author AMMAR HASAYEN CISSP | CISM | AWS Architect | Azure Security Engineer | M365 Security Engineer
  • 3. Cloud Migration Handbook Vol. 1 Now available! Authored by Jose A. Hernandez, myCloudDoor CTO, Ammar Hasayen, a recognized worldwide expert on cybersecurity and Javier Aguado, myCloudDoor Cloud Services Director https://me.ahasayen.com/cloud-migration/
  • 4. OVERVIEW Move to the cloud – Agility and speed of delivery – Governance and security Cloud Reference Architecture – ISO/IEC 17789:2014 Azure cloud computing Audience – Cloud architects – Security professionals – Any organization moving to the cloud
  • 6. The biggest blockers for organizations to adopt cloud first strategy are Security and Compliance
  • 7. CEO of AvaLAN Wireless, warns that the United States next Pearl Harbor will be cyber-attack
  • 8. According to a recent Gartner report, it is most likely that 95% of cloud security failures will be the customer’s fault
  • 9. Just think about these facts for a moment
  • 14. The Need For Cloud Reference Architecture Cloud Reference Architecture also known as CRA
  • 16. Islands Workload islands that are managed separately Cost Managing cost of running workloads in the cloud becomes a challenge The End Result
  • 20. The Benefits of Cloud Reference Architecture
  • 21. Cloud reference architecture (CRA) helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud CRA
  • 22. Design Patterns Guidance CRA Cloud Reference Architecture CRA Deploy Workloads
  • 23. User View Functional View Implementation View Deployment View The ISO/IEC 17789 CRA defines four different views: 1. User View 2. Functional View 3. Implementation View 4. Deployment View
  • 24. Deployment View - Framework for all cloud deployments. - Reduce design effort - Blueprint for all cloud projects. • Quickly deploy workloads. • Reduce complexity. • Reduce Risk.
  • 25. The Need for Enterprise Scaffold
  • 26. Cost Management Layer Governance Layer Security Layer Trust Layer CRA Deploy Resources
  • 27. Engineers build a building - Creating basis of the structure (Scaffold) - Provides anchor points of more permanent systems to be mounted https://bit.ly/2ZdYZIA
  • 28. Enterprise Scaffold Resources deployed in the cloud: - Meet minimum security and governance practices. - Enable developers to deploy applications quickly.
  • 29. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 30. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 31. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 32. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 33. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 34. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 35. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 36. Enterprise Scaffold BusinessContinuity Monitoring&Logging Enterprise Structure Deployment Essentials Core Networking Resource Governance Deploy Workloads Security & Compliance Management Hierarchy Naming Convention Data Sovereignty Templates Automations BlueprintsInfrastructure as a Code Hybrid Connections Hub-Spoke IP Addressing DMZ Firewalls & NSGs UDR VNET Peering Name Resolution Resource Tagging Cost Management Azure Locks Azure Policies LOB Workspaces DevOps Pipelines Versioning Shared Services Secure DevOps Toolkit Patching Azure PIM Identity & RBAC VNET Service Points DDoS Incident Response Security Center Enterprise Hierarchy Accountability Subscriptions Resource Groups
  • 37. SUMMARY What is the purpose of CRA Balancing security & governance with agility & speed of delivery The need for ‘Enterprise Scaffold’ as a framework to achieve that balance.
  • 38. References • ISO/IEC 17789:2014: Cloud computing - Reference architecture https://www.iso.org/standard/60545.html • Azure Enterprise Scaffold https://docs.microsoft.com/en-us/azure/architecture/cloud-adoption/appendix/azure- scaffold • My Cloud Migration Handbook Vol. 1 http://me.ahasayen.com/cloud-migration
  • 40. PLEASE SHARE YOUR FEEDBACK ON ONE OF MY SOCIAL CHANNELS @ammarhasayen Let Me Know Your Feedback
  • 41. YOU CAN ACCESS THE SLIDES FROM SlideShare @ammarhasayen Thank You For Your Time
  • 45. Cloud Migration Handbook Vol. 1 Now available! Authored by Jose A. Hernandez, myCloudDoor CTO, Ammar Hasayen, a recognized worldwide expert on cybersecurity and Javier Aguado, myCloudDoor Cloud Services Director https://me.ahasayen.com/cloud-migration/

Editor's Notes

  • #2: In this video series, we are going to talk about the cloud reference architecture and since this is an extremely strategic topic, I am going to cover it in more than one video, and today I am going to start with part 1 or the foundation of the cloud reference architecture
  • #3: A little bit about me, my name is Ammar Hasayen, I have over 15 years of experience and focusing now in cloud computing and cloud security. I am a Microsoft MVP, a Pluralsight author for many cloud security courses, I speak frequently in international conferences in Europe and the statues. I am certified in Azure and AWS and here are my social media links in this slides.
  • #4: I have recently published with two great authors and the book is called (Cloud Migration Handbook) and I highly recommend you follow this link in the slide to learn more about it. In fact, all what we are going to cover in this video series is only scratching the surface of what you can learn from this book.
  • #5: So you are considering that bold move to the cloud and of course, what we all want to is that magical balance between agilitiy and speed of delivery from one side, and governance and security from the other side. This is where the cloud reference architecture comes to the picture, so we are going to define it as per the ISO standard. All what we are going to cover applies any cloud, but for simplicity, I am going to use Azure cloud computing for my examples. Who are the audience of this video series, of course cloud architects , security professionals because we will have a lot of security stuff today, and other stackeholders and senior people in your organization who are part of the cloud migration project
  • #6: I want to start by sharing with you some insights to help you understand the urgency of what I am trying to teach you in this video.
  • #7: And I will start by asking you if you know that as per today, that the biggest blockers for organizations to adopt a cloud first strategy are security and compliance? I work a lot with banks, and this is the first thing that I hear when someone talks about cloud computing. It is not secured and can’t be trusted
  • #8: In fact, the CEO of AvaLan wireless warns that the united states next pearl harbor will be cyber-attack. The nightmare of data leaks and the fear of losing reputation and customer trust is top of mind of every CEO when thinking of moving to the cloud
  • #9: While cloud computing offers a lot of security features to customers that sometimes even on-premises deployments can’t provide, , 95% of cloud security failures will be customer’s fault according to a recent Gartner report. Security in the cloud is a shared responsibility between you as a customer and the cloud provider. Many organizations fail to identify this trust boundary and who is responsible of what is often lost in translation.
  • #10: So I want you to pause for a minute and think about these facts for a moment. I mean, your job as a security professional is to bridge that gap after all, and this is exactly what we are trying to achieve today.
  • #11: You might be asking, what gap are you talking about, well, organizations want to use cloud computing to take advantage of the agility and elasticity of the cloud and to help them digitally transform. However, the fear from trusting the cloud to host their data is still a concern and is slowing the cloud migration process for many organizations.
  • #12: But you might agree with me or not I believe that the cloud is not evil, it gives you the agility and elasticity your business needs to grow and transform, while security and compliance are slowing you down. What you need is a way to balance the two sides, to have the agility of the cloud without compromising security and compliance and also to trust your cloud to host your data and workloads. In other words, you need to extend the trust you have for your on-premises infrastructure to the cloud computing so that you can migrate and deploy workloads with confident. And this is exactly is your role as a cloud architect, as a security professional or a as a compliance offier.
  • #13: Congratulations, you are the cloud builder. You are assigned the task of achieving this balance by understanding the nature of cloud computing and by deeply considering your organization’s security and compliance requirements. Now I know this is much to ask for, but don’t worry, I am going to help you how to achieve this balance One way to accomplish that is to plan and design a blueprint. You can give your devops team this blueprint and ask : Could you please use this blueprint when you deploy any resource in the cloud? Hmmm, the devops team might ask for a reason, so you would tell them deploying cloud resources using this blueprint means what you build in the cloud is compliant, secure and meets your company’s policies and governance.
  • #14: Now between us, this blueprint is what we will be calling the cloud reference architecture or CRA for short.
  • #15: Before digging into the definition of CRA and its benefits, it is better to look at how things can go wrong without having one. You will quickly realize that it is better to spend some time before migration to plan your cloud migration journey with security and governance in mind. Doing that will not only save you time and money but will help you meet your security and governance needs. So let’s get started.
  • #16: When organizations start planning their cloud migration, and like anything else new, they start by trying and testing some capabilities. Perhaps they start hosting their development environment in the cloud while keeping their production one on-premises. It is also common to see small and isolated applications being migrated first, perhaps because of their size, low criticality and to give the cloud a chance to prove it is trust worthy. After all, migration to the cloud is a journey and doesn’t happen overnight. Then the benefits of cloud solutions became apparent and companies started to migrate multiple large-scale workloads. As more and more workloads move to the cloud, many organizations find themselves dealing with workload islands that are managed separately with different security models and independent data flows. Even worse, with the pressure to quickly get new applications deployed in the cloud with strict deadlines, developers find themselves rushing to consume new cloud services without reasonable consideration to organization’s security and governance needs.
  • #17: The unfortunate result in most cases is to end up with a cloud infrastructure that is hard to manage and maintain. Each application could end up deployed in a separate island with its own connectivity infrastructure and with poor access management. Managing cost of running workloads in the cloud becomes also challenge. There is no clear governance and accountability model which leads to a lot of management overhead and security concerns.
  • #18: The lack of governance, automation, naming convention and security models are even hard to achieve afterwards. In fact, it is nightmare to look at a poorly managed cloud infrastructure and then trying to apply security and governance afterword because these need to be planned a head before even deploying any cloud resources
  • #19: Even worse, data can be hosted in geographies that violates corporate’s compliance requirements, which is a big concern for most organizations. I remember once asking one of my customers if they knew where their cloud data is hosted, and most of them just don’t know.
  • #20: For example, you can see here different applications deployed in their own virtual networks. Each application maintains a separate security and connectivity infrastructure, now not only that this is extremely hard to manage environment, the chance that the security team is aware of all these deployed applications is not always good, which could easily lead to implementing an application environment with missing security equipments.
  • #21: Now that you understand what might go wrong without a reference architecture, let us introduce what a CRA means and see how it can help you in your cloud migration journey.
  • #22: Simply put, the cloud reference architecture (CRA) helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud.
  • #23: It serves as a collection of design guidance and design patterns to support structured approach to deploy services and applications in the cloud. This means that every workload is deployed with security, governance and compliance in mind from day one.
  • #24: The ISO/IEC 17789 Cloud Computing Reference Architecture defines four different views for the CRA: User View Functional View Implementation View Deployment View. We will be focusing on the Deployment View of the Cloud Reference Architecture for now.
  • #25: The CRA Deployment View provides a framework to be used for all cloud deployment projects, which reduces the effort during design and provides an upfront guidance for a deployment aligned to architecture, security and compliance. You can think of the CRA Deployment View as the blueprint for all cloud projects. What you get from this blueprint, the end goal if you are wondering, is to help you quickly develop and implement cloud-based solutions, while reducing complexity and risk. Therefore, having a foundation architecture not only helps you ensure security, manageability and compliance but also consistency for deploying resources. It includes network, security, management infrastructure, naming convention, hybrid connectivity and more. Now I know what you might be thinking right now? How does one blueprint fit the need for organizations with different sizes? Since not all organizations are the same, the CRA Deployment View does not outline a single design that fits all sizes. Rather, it provides a framework for decisions based on core cloud services, features and capabilities.
  • #26: One of the main concepts of a CRA that I would like to share with you today is the concept of an enterprise scaffold.
  • #27: Let’s start from the beginning. When you decide to migrate to the cloud and take advantage of all what the cloud has to offer, there are couple of concerns that you should address first. Things like: A way to manage and track cost effectively (how can you know what resources are deployed so you can account for it and bill it back accurately). Establishing governance framework to address key issues like data sovereignty. Deploy with mindset of security first (defining clear management roles, access management, and security controls across all deployments). Building trust in the cloud (have peace of mind that cloud resources are managed and protected from day one).   These concerns are top priority for every organization when migrating to the cloud and should be addressed early in the cloud migration planning phase.
  • #28: To address all these key concerns, you need to think of adopting a framework or an enterprise scaffold that can help you move to the cloud with confidence. Think about how engineers build a building. They start by creating the basis of the structure (scaffold) that provides anchor points for more permanent systems to be mounted.
  • #29: The same applies when deploying workloads in the cloud. You need an enterprise scaffold that provides structure to the cloud environment and anchors for services built on top. It is the foundation that builders (IT teams) use to build services with speed of delivery in mind. The enterprise scaffold ensures that workloads you deploy in the cloud meet the minimum security and governance practices your organization is adopting while giving developers the ability to deploy services and applications quickly to meet their goals and deadlines, which is a win win solution.
  • #30: To accomplish this, we need to define the components of the cloud reference architecture that we will use to build secure, compliant and flexible framework that developers can build application on top with agility and speed of delivery in mind. At the core of building an enterprise scaffold for cloud migration is the Enterprise Structure Layer which act as the foundation on which all other layers are built. Here you define a hierarchy that maps to your organization departments and cost centers to govern spending and get visibility of cost across departments, line of business applications or business units. On top, you define a Management Hierarchy that gives you even more flexibility when assigning permissions and applying policies to enforce your governance in the cloud. With that carefully defined, you start adopting key best practices and patterns that maps to your organization’s maturity level. You can think of these as the Deployment Essentials which includes establishing a proper naming convention, deploying with automation and using Infrastructure as Code instead of using the web interface to deploy resources which can cause a snow ball effect of changes that in the future becomes hard to manage, track or even audit. The idea here is to have a consistent way of deploying resources over and over again. Not only it gives you that speed of delivery we all want to have, but also a piece of mind that what you verified as a compliant environment in code, is the blueprint used to deploy resources across your subscriptions. Now it is time to start building the foundation infrastructure and this is the Core Networking layer. At this layer, governance can be achieved using different technologies that helps you isolate and deploy security controls to monitor and inspect traffic across your cloud infrastructure. One of the best recommendations here is to use a hub and spoke topology and adopt the shared service model where common resources are consumed from different LOB applications which has many benefits that we will discuss in great details later. In this layer, you decide how to extend your on-premises data center to the cloud. You also define how to design and implement isolation using virtual networks and user defined routes .This is also the time where you deploy Network Virtual Appliances (NVAs) and firewalls to inspect data flow inside your cloud infrastructure. Another key feature of the cloud is the Software Defined Networks (SDNs) that gives you the opportunity to do micro-segmentation by implementing Network Security Groups and Application Security Groups to better control traffic even within subnets, not only at the edge of the network which is an evolution of how we think about isolation and protection in such elastic cloud computing environment. After you are done with the core networking layer, and just before deploying your resources, you should consider how are you going to enforce Resource Governance. This is important because the goal of the cloud reference architecture is to give developers more control and freedom to deploy workloads quickly and meet their deadlines, while adhering to corporate security and governance needs. One way to achieve this balance is by applying resource tags, implementing cost management controls, and also by translating your organizational governance rules and policies into Azure policies that governs the usage of cloud resources. Once all this foundation work is finished, you can start planning how to deploy your line of business applications (LOB applications). Most likely you need to define different application lifecycle environments like (Production, Dev, and QA). Here you can also establish a shared services workspace to hosts shared infrastructure resources for your line of business applications to consume. If one of your business applications requires a connectivity to on-premises resources, it can use the VPN gateway for example deployed in the shared services workspace instead of implementing a gateway for each application’s workspace. The shared services workspace is a key element when defining your CRA as it hosts shared services like domain controllers, DNS services, jumpbox devices and security controls like firewalls. But your job is far from finished, as security is a never-ending process, and this is where the Security Layer comes to the picture. Here you define proper identity and access management model using Azure RBAC. Security practices like patching, encryption and secure DevOps are key areas in this layer. Furthermore, to gain the visibility and control you need in such rapidly changed environment, you need to think of a security as a service model which natively integrate with the cloud platform and services, so here you can use Azure security center to assess your environment for vulnerabilities but also as enabler to your incident response in the cloud, as you need to detect and remediate security incidents. You can also implement Just-in Time Virtual Machine Access to lock down management ports on your virtual machines. If you are highly regulated environment, you can also look at VNET Service Endpoints to protect access to PaaS Services like Azure Storage so that accessing these services does not pass through the public internet. With all this in mind, you need to consider Business Continuity, high availability and backup, and here I want to remind you of the shared reasonability model of the cloud. You are responsible of many things which might include planning how to do backups, how to design for high availability and even for disaster recovery And finally, How to think of monitoring and auditing in the cloud. Is there is a performance bottleneck that you should address right away, do you require that changes to your cloud environment is audited, so where are you going to keep the logs, are you going to integrate that with your on-premises SIEM solution, or use a cloud logging mechanism, and if so, does that solution retain the logs for the duration you need?      
  • #38: In summary, the cloud reference architecture helps organizations address the need for detailed, modular and current architecture guidance for building solutions in the cloud. It helps us achieve that balance between agility and speed of delivery from one side, and security and governance from the other side. To do that, we’ve defined the enterprise scaffold and the different layers and components that all work together as a blueprint for any cloud migration project
  • #39: I will leave you of course with some great resources, including a link to my cloud migration book that takes this conversation to the next level with more deep guidance and design patterns on how to approach any cloud migration project.
  • #40: Don’t forget to check the video description below for links to upcoming videos in this cloud reference architecture series.
  • #41: Let me know what you think and please share your feedback in the comments bellow.
  • #42: Thank you for your time and don’t forget to check the slides at slideshare
  • #44: Finally, I would love if we connect o social media, thank you again for your time, and see you in my next video.