Phillip's Portfolio

Building & Securing Azure Cloud Infrastructures

My Image

Learning to build and secure a cloud environment on Microsoft Azure as part of the UC Berkeley cybersecurity bootcamp was an enlightening and challenging journey. As a novice in the realm of cloud computing, the initial phase of this learning experience began with understanding the core concepts of Azure and its services. This foundational knowledge was crucial, as it included understanding what virtual machines, load balancers, security groups, and resource groups are, and how they interconnect to form a robust and scalable cloud infrastructure. The bootcamp's structured curriculum and hands-on labs provided an interactive way to grasp these concepts. Particularly useful were the modules on Azure's architecture and the principles of cloud security, which set the stage for the practical application of building the environment.

The actual process of building the cloud environment was a blend of guided instruction and exploratory learning. The first step involved setting up a resource group in Azure, which served as a logical container for all the resources I was about to deploy. This was followed by creating and configuring two web virtual machines (VMs). These VMs were designed to host web applications, and setting them up involved choosing the right size, configuring the operating system, and ensuring they were connected to the right network interfaces. The bootcamp emphasized the importance of security, so I paid special attention to configuring the VMs with appropriate security settings. The next critical component was the jump box provisioner, a secure VM used to access and manage the other VMs in the cloud environment. Configuring the jump box with the right access controls and security measures was a crucial step, as it acted as a gateway to the entire infrastructure.

Integrating a load balancer into this environment added another layer of complexity and learning. The load balancer's role was to distribute traffic evenly across the two web VMs, ensuring high availability and reliability of the web applications. Configuring the load balancer required an understanding of how traffic should be distributed and how to maintain performance under different load conditions. Additionally, setting up a security group was essential to define the inbound and outbound network traffic rules for the VMs and protect them from unauthorized access. This comprehensive project culminated in a functional and secure cloud environment, crafted under the guidance of the bootcamp instructors. The process was not only a technical achievement but also a significant learning curve, providing a deep dive into the practical aspects of cloud computing and cybersecurity.

In securing the Azure cloud environment, I employed a multi-layered security approach that hinged on robust firewalls and meticulously configured security groups. The firewalls served as a primary defense line, scrutinizing incoming and outgoing traffic to prevent unauthorized access and potential threats. Alongside, Azure's security groups played a pivotal role, acting as virtual firewalls at the instance level to control inbound and outbound traffic based on predetermined security rules. This setup was further bolstered by implementing advanced security measures such as encryption for data at rest and in transit, routine security audits, and continuous monitoring for unusual activity. By integrating these diverse yet complementary security controls, I was able to create a highly secure and resilient cloud infrastructure, effectively safeguarding it against a wide array of cyber threats.