| Service | Data type | Primary use case |
|---|---|---|
| Blob Storage | Any (images, video, logs, backups) | Large-scale object storage, media serving, backups |
| Azure Files | Files in shared directories | Replace on-premises file servers, SMB/NFS shared access |
| Queue Storage | Text messages up to 64 KB | Async processing, decoupling app components |
| Table Storage | Structured NoSQL entities | User profiles, device metadata, flexible datasets |
| Disk Storage | Block-level volumes | OS and data disks for Azure VMs |
| Option | Copies | Location | Zone protection | Region protection |
|---|---|---|---|---|
| LRS | 3 | 1 data center, 1 region | No | No |
| ZRS | 3 | 3 availability zones, 1 region | Yes | No |
| GRS | 6 (3+3) | LRS in primary + secondary region | No | Yes |
| GZRS | 6 (3+3) | ZRS in primary + secondary region | Yes | Yes |
| Tier | Access frequency | Min storage | Retrieval | Best for |
|---|---|---|---|---|
| Hot | Frequent | None | Instant | Active website images, daily reports |
| Cool | Infrequent | 30 days | Instant | Short-term backups, older invoices |
| Cold | Rare | 90 days | Instant | Long-term backups, compliance data |
| Archive | Almost never | 180 days | Up to 15 hours | 7-year audit records, regulatory archives |
| Tool | Type | Best for |
|---|---|---|
| Azure Migrate | Service hub | Discovering, assessing, and migrating on-premises infrastructure, data, and apps to Azure. Single unified portal. |
| Azure Data Box | Physical device (80 TB) | Transferring 40+ TB when network is too slow or unavailable. Encrypted device shipped to you; ship back after copying. Device wiped after upload. |
| AzCopy | CLI tool | High-performance blob/file transfers. Upload, download, copy between storage accounts, sync directories, cross-cloud copy. Supports scripted automation. |
| Azure Storage Explorer | GUI desktop app | Interactive ad-hoc storage management. Windows/macOS/Linux. Uses AzCopy under the hood. Browse containers, upload/download files, manage SAS tokens. |
| Azure File Sync | Service | Syncs on-premises Windows Server with Azure Files. Cloud tiering: frequently accessed files stay local, others stored in cloud. Multiple server caches for global distribution. |
Authentication (AuthN)
Proving WHO you are. Happens at login — you present credentials and the system validates them.
Airport analogy: Checking your passport at check-in. Confirms your identity.
Authorization (AuthZ)
Determining WHAT you can do. After authentication confirms identity, authorization decides which resources you can access.
Airport analogy: Checking your boarding pass at the gate. Confirms which seat you can sit in.
| Role | Can create/manage resources | Can manage access | Can view resources |
|---|---|---|---|
| Owner | Yes | Yes — full access management | Yes |
| Contributor | Yes | No — cannot assign roles | Yes |
| Reader | No | No | Yes (read-only) |
| User Access Administrator | No | Yes — access management only | Yes (like Reader) |
Data layer (innermost)
Controls who accesses business and customer data. Encryption at rest and in transit. Least-privilege data access even for authorized users.
Application layer
Security integrated into development. Input validation, output encoding, parameterized queries, security testing in CI/CD. Secure by design.
Compute layer
Close unnecessary ports, apply OS patches, install endpoint protection, disable unused services. Azure Defender monitors for misconfigurations.
Network layer
NSGs isolate resources and limit lateral movement. If an attacker gets in, the network layer contains the breach to the compromised resource.
Perimeter layer
DDoS Protection absorbs attacks before they reach apps. WAF filters malicious HTTP traffic. Alerts enable monitoring of potential attacks.
Identity and access layer
MFA, RBAC, Conditional Access, Privileged Identity Management. Only authorized identities interact with resources. All access events are audit-logged.
Physical security (outermost)
Secure building access, 24/7 security staff, biometrics, surveillance, mantraps. Only authorized Microsoft employees access physical infrastructure.