{"id":4179,"date":"2019-08-07T15:15:59","date_gmt":"2019-08-07T19:15:59","guid":{"rendered":"https:\/\/adsecurity.org\/?p=4179"},"modified":"2019-08-07T13:49:43","modified_gmt":"2019-08-07T17:49:43","slug":"slides-posted-for-black-hat-usa-2019-talk-attacking-defending-the-microsoft-cloud","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=4179","title":{"rendered":"Slides Posted for Black Hat USA 2019 Talk: Attacking &#038; Defending the Microsoft Cloud"},"content":{"rendered":"\n<p>Attacking and Defending the Microsoft Cloud (Office 365 &amp; Azure AD) <br>Sean Metcalf (Trimarc) &amp; Mark Morowczynski  (Principal Program Manager, Microsoft)<\/p>\n\n\n\n<p>The allure of the &#8220;Cloud&#8221; is indisputable. Organizations are moving into the cloud at a rapid pace. Even companies that have said no to the Cloud in the past have started migrating services and resources. The Cloud is a new paradigm and the rapid update pace makes it difficult to keep up, especially when it comes to security. <\/p>\n\n\n\n<p>This presentation focuses on the Microsoft Cloud (Office 365 &amp; Azure AD) and explores the most common attacks against the Cloud and describes effective defenses and mitigation. While the content is focused on the Microsoft Cloud, some of the attack and defense topics are applicable to other cloud providers and are noted where applicable. <\/p>\n\n\n\n<p>Key items covered: <br>\nAttacks against the Cloud<br>\nAccount compromise and token theft<br>\nMethods to detect attack activity<br>\nCloud identity firewall<br>\nSecuring cloud infrastructure against attacks<br>\nSecure cloud administration<\/p>\n\n\n\n<p><a href=\"https:\/\/adsecurity.org\/wp-content\/uploads\/2019\/08\/2019-BlackHat-US-Metcalf-Morowczynski-AttackingAndDefendingTheMicrosoftCloud.pdf\">Slides (PDF)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attacking and Defending the Microsoft Cloud (Office 365 &amp; Azure AD) Sean Metcalf (Trimarc) &amp; Mark Morowczynski (Principal Program Manager, Microsoft) The allure of the &#8220;Cloud&#8221; is indisputable. Organizations are moving into the cloud at a rapid pace. Even companies that have said no to the Cloud in the past have started migrating services and &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=4179\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-4179","post","type-post","status-publish","format-standard","hentry","category-technical-reference","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4179","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4179"}],"version-history":[{"count":2,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4179\/revisions"}],"predecessor-version":[{"id":4182,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/4179\/revisions\/4182"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4179"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4179"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4179"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}