Windows Azure uses a large, homogeneous, shared-hardware computing base to host a diverse collection of customer apps that’re exposed to users from Internet. And it’s all built on top of Windows. How could that possibly be secure? In this video of the Security Talk webcast series, Charlie Kaufman describes how the Azure software is structured to accept software and configuration requests from customers, deploy the software within virtual machines, and allocate storage and database resources to hold a persistent state—all while maintaining a minimal attack surface and several layers of defense in depth. Charlie also helps you evaluate how Azure security compares with systems operated on a customer’s premises.