Common Components
The following components are standard for an Azure deployment.
•Azure Kubernetes Service (AKS) for container orchestration
•Azure Virtual Machines for virtual computing resources
•Azure Blob Storage for object storage
•Azure Database for PostgreSQL for managed PostgreSQL databases
•Azure File Storage for scalable file storage
•Azure Functions for server less computing
•Azure Resource Manager for infrastructure as code
•Azure Monitor for monitoring and logging
•Azure Active Directory (AD) for access control
Azure Security
•Youtap uses Azure Security Center for threat protection and to identify potential security vulnerabilities.
•All Azure Virtual Machines are encrypted with Azure Disk Encryption using an industry-standard AES-256 encryption algorithm.
•Youtap uses Azure Active Directory for authentication and identity management.
•All network traffic is encrypted using SSL/TLS.
•Azure Key Vault is used to securely store and manage cryptographic keys and secrets used by the application.
•Azure Security Center is used to provide continuous monitoring and threat detection.
•Azure Firewall is used to protect the application against unauthorised access.
Azure DDoS Protection is used to protect the application against distributed denial of service attacks