๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Mastering Azure Security: Keeping your Microsoft Azure workloads safe, 2nd Edition

โœ Scribed by Mustafa Toroman, Tom Janetscheck


Publisher
Packt Publishing
Tongue
English
Leaves
320
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents

Key Features

  • Learn how to secure your Azure cloud workloads across applications and networks
  • Protect your Azure infrastructure from cyber attacks
  • Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices

Book Description

Security is integrated into every cloud, but this makes users put their guard down as they take cloud security for granted. Although the cloud provides higher security, keeping their resources secure is one of the biggest challenges many organizations face as threats are constantly evolving. Microsoft Azure offers a shared responsibility model that can address any challenge with the right approach.

Revised to cover product updates up to early 2022, this book will help you explore a variety of services and features from Microsoft Azure that can help you overcome challenges in cloud security. You'll start by learning the most important security concepts in Azure, their implementation, and then advance to understanding how to keep resources secure. The book will guide you through the tools available for monitoring Azure security and enforcing security and governance the right way. You'll also explore tools to detect threats before they can do any real damage and those that use machine learning and AI to analyze your security logs and detect anomalies.

By the end of this cloud security book, you'll have understood cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure.

What you will learn

  • Become well-versed with cloud security concepts
  • Get the hang of managing cloud identities
  • Understand the zero-trust approach
  • Adopt the Azure security cloud infrastructure
  • Protect and encrypt your data
  • Grasp Azure network security concepts
  • Discover how to keep cloud resources secure
  • Implement cloud governance with security policies and rules

Who this book is for

This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively.

Table of Contents

  1. An Introduction to Azure Security
  2. Governance and Security
  3. Managing Cloud Identities
  4. Azure Network Security
  5. Azure KeyVault
  6. Data Security
  7. Microsoft Defender for Cloud
  8. Microsoft Sentinel
  9. Security Best Practices

โœฆ Table of Contents


Cover
Title Page
Copyright and Credits
Contributors
Table of Contents
Preface
Section 1: Identity and Governance
Chapter 1: An Introduction to Azure Security
Exploring the shared responsibility model
On-premises
IaaS
PaaS
SaaS
Division of security in the shared responsibility model
Physical security
Azure network
Azure infrastructure availability
Azure infrastructure integrity
Azure infrastructure monitoring
Understanding Azure security foundations
Summary
Questions
Chapter 2: Governance and Security
Understanding governance in Azure
Using common sense to avoid mistakes
Using management locks
Using management groups for governance
Understanding Azure Policy
Mode
Parameters
Policy assignments
Initiative definitions
Initiative assignments
Policy exemptions
Policy best practices
Defining Azure blueprints
Blueprint definitions
Blueprint publishing
Azure Resource Graph
Querying Azure Resource Graph with PowerShell
Querying Azure Resource Graph with the Azure CLI
Advanced queries
Summary
Questions
Chapter 3: Managing Cloud Identities
Exploring passwords and passphrases
Dictionary attacks and password protection
Understanding MFA
How to enable MFA in Azure AD
MFA activation from a user's perspective
Introducing security defaults
Using Conditional Access
Named locations
Custom controls
Terms of use
Conditional Access policies
Introducing Azure AD Identity Protection
Azure AD Identity Protection at a glance
Understanding role-based access control
Creating custom RBAC roles
Protecting admin accounts with Azure AD PIM
Managing Azure AD roles in PIM
Managing Azure resources with PIM
Hybrid authentication and Single Sign-On
Understanding passwordless authentication
Global settings
Licensing considerations
Summary
Questions
Section 2: Cloud Infrastructure Security
Chapter 4: Azure Network Security
Understanding Azure Virtual Network
Connecting on-premises networks with Azure
Creating an S2S connection
Connecting a VNet to another VNet
VNet service endpoints
Private endpoints
Considering other VNet security options
Azure Firewall deployment and configuration
Azure DDoS protection
Azure Bastion
Hub-and-spoke network topology
Hub VNet
Understanding Azure Application Gateway
Understanding Azure Front Door
Summary
Questions
Chapter 5: Azure Key Vault
Understanding Azure Key Vault
Understanding access policies
Understanding service-to-service authentication
Understanding managed identities for Azure resources
Using Azure Key Vault in deployment scenarios
Creating an Azure Key Vault and secret
Azure VM deployment
Summary
Questions
Chapter 6: Data Security
Technical requirements
Understanding Azure Storage
Understanding Azure virtual machine disks
Working on Azure SQL Database
Summary
Questions
Section 3: Security Management
Chapter 7: Microsoft Defender for Cloud
Introducing Microsoft Defender for Cloud
Enabling Microsoft Defender for Cloud
Using auto-provisioning to deploy extensions
Enabling Microsoft Defender for Cloud's enhanced security
Cloud Security Posture Management with Defender for Cloud
Working with recommendations
How to prioritize remediation
Working with resource exemptions
Custom policies and (regulatory) compliance
Using the regulatory compliance dashboard
Working with regulatory compliance standards
Cloud workload protection and multi-cloud capabilities
Microsoft Defender for Servers
Microsoft Defender for Containers
Threat detection summary
Automating security
Continuous export
Workflow automation
REST APIs
Multi-cloud capabilities in Microsoft Defender for Cloud
Summary
Questions
Chapter 8: Microsoft Sentinel
Introduction to SIEM
Getting started with Microsoft Sentinel
Configuring data connectors and retention
Working with Microsoft Sentinel dashboards
Setting up rules and alerts
Microsoft Sentinel automation
Creating workbooks
Using threat hunting and notebooks
Advanced threat detection
Using community resources
Summary
Questions
Chapter 9: Security Best Practices
Log Analytics design considerations
Understanding Azure SQL Database security features
Security in Azure App Service
Storage account access keys
Summary
Questions
Assessments
Index
Other Books You May Enjoy


๐Ÿ“œ SIMILAR VOLUMES


Mastering Azure Security: Keeping your M
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to secure your Azure cloud workloads across applications and networks</span></span></li><li><span><span>Pr

Mastering Azure Security: Keeping your M
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to secure your Azure cloud workloads across applications and networks</span></span></li><li><span><span>Pr

Mastering Azure Security: Safeguard your
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Leverage Azure security services to architect robust cloud solutions in Microsoft Azure</b></p> <h4>Key Features</h4> <ul><li>Secure your Azure cloud workloads across applications and networks </li> <li>Protect your Azure infrastructure from cyber attacks </li> <li>Discover tips and techniques

Mastering Azure Security: Safeguard your
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

Security is always integrated into cloud platforms, causing users to let their guard down as they take cloud security for granted. Cloud computing brings new security challenges, but you can overcome these with Microsoft Azure's shared responsibility model. Mastering Azure Security covers the lat

Microsoft Azure Security
โœ Freato R. ๐Ÿ“‚ Library ๐ŸŒ English

Packt Publishing, 2015. โ€” 239 p. โ€” ISBN-10: 1784399973, ISBN-13: 978-1784399979.<br/> <br/><strong><em>Microsoft Azure Security</em> helps you ensure that all your applications and services stay secure and safe from any threats.</strong> Starting with a quick tour through the fundamentals of securit