๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Mastering Azure Security: Safeguard your Azure workload with innovative cloud security measures

โœ Scribed by Mustafa Toroman, Tom Janetscheck


Publisher
Packt Publishing
Year
2020
Tongue
English
Leaves
263
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Security is always integrated into cloud platforms, causing users to let their guard down as they take cloud security for granted.

Cloud computing brings new security challenges, but you can overcome these with Microsoft Azure's shared responsibility model. Mastering Azure Security covers the latest security features provided by Microsoft to identify different threats and protect your Azure cloud using innovative techniques. The book takes you through the built-in security controls and the multi-layered security features offered by Azure to protect cloud workloads across apps and networks. You'll get to grips with using Azure Security Center for unified security management, building secure application gateways on Azure, protecting the cloud from DDoS attacks, safeguarding with Azure Key Vault, and much more. Additionally, the book covers Azure Sentinel, monitoring and auditing, Azure security and governance best practices, and securing PaaS deployments.

By the end of this book, you'll have developed a solid understanding of cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure.

โœฆ Table of Contents


Cover
Title Page
Copyright and Credits
About Packt
Contributors
Table of Contents
Preface
Section 1: Identity and Governance
Chapter 1: Introduction to Azure security
Exploring the shared responsibility model
On-premises
Infrastructure as a Service
Platform as a Service
Software as a Service
Division of security in the shared responsibility model
Physical security
Azure network
Azure infrastructure availability
Azure infrastructure integrity
Azure infrastructure monitoring
Understanding Azure security foundations
Summary
Questions
Chapter 2: Governance and Security
Understanding governance in Azure
Using common sense to avoid mistakes
Using management locks
Using management groups for governance
Understanding Azure Policy
Mode
Parameters
Policy assignments
Initiative definitions
Initiative assignments
Policy best practices
Defining Azure blueprints
Blueprint definitions
Blueprint publishing
Azure Resource Graph
Querying Azure Resource Graph with PowerShell
Querying Azure Resource Graph with the Azure CLI
Advanced queries
Summary
Questions
Chapter 3: Managing Cloud Identities
Exploring passwords and passphrases
Dictionary attacks and password protection
Understanding Multi-Factor Authentication (MFA)
MFA activation in Azure AD
MFA activation from a user's perspective
Using Conditional Access
Named locations
Custom controls
Terms of use
Conditional Access policies
Introducing Azure AD Identity Protection
Azure AD Identity Protection at a glance
Understanding RBAC
Creating custom RBAC roles
Protecting admin accounts with Azure AD PIM
Enabling PIM
Managing Azure AD roles in PIM
Managing Azure resources with PIM
Hybrid authentication and SSO
Understanding passwordless authentication
Global settings
Licensing considerations
Summary
Questions
Section 2: Cloud Infrastructure Security
Chapter 4: Azure Network Security
Understanding Azure Virtual Network
Connecting on-premises networks with Azure
Creating an S2S connection
Connecting a VNet to another VNet
VNet service endpoints
Considering other virtual networks' security
Azure Firewall deployment and configuration
Understanding Azure Application Gateway
Understanding Azure Front Door
Summary
Questions
Chapter 5: Azure Key Vault
Understanding Azure Key Vault
Understanding access policies
Understanding service-to-service authentication
Understanding Managed Identities for Azure Resources
Using Azure Key Vault in deployment scenarios
Creating an Azure key vault and a secret
Azure VM deployment
Summary
Questions
Chapter 6: Data Security
Technical requirements
Understanding Azure Storage
Understanding Azure Virtual Machines disks
Summary
Questions
Section 3: Security Management
Chapter 7: Azure Security Center
Introducing Azure Security Center
Enabling Azure Security Center
Azure Secure Score and recommendations
Working with recommendations
The Azure Security Center community
Workflow automation and sections in Azure Security Center
Policy & compliance
Threat protection
Summary
Questions
Chapter 8: Azure Sentinel
Introduction to SIEM
Getting started with Azure Sentinel
Working with Azure Sentinel Dashboards
Setting up rules and alerts
Creating workbooks
Using threat hunting and notebooks
Using community resources
Summary
Questions
Chapter 9: Security Best Practices
Log Analytics design considerations
Understanding Azure SQL Database security features
Security in Azure App Service
Summary
Questions
Further reading
Assessments
Chapter 1: Azure Security Introduction
Chapter 2: Governance and Security
Chapter 3: Governance and Security
Chapter 4: Azure Network Security
Chapter 5: Azure Key Vault
Chapter 6: Data Security
Chapter 7: Azure Security Center
Chapter 8: Azure Sentinel
Chapter 9: Security Best Practices
Other Books You May Enjoy
Leave a review - let other readers know what you think
Index


๐Ÿ“œ SIMILAR VOLUMES


Mastering Azure Security: Safeguard your
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Leverage Azure security services to architect robust cloud solutions in Microsoft Azure</b></p> <h4>Key Features</h4> <ul><li>Secure your Azure cloud workloads across applications and networks </li> <li>Protect your Azure infrastructure from cyber attacks </li> <li>Discover tips and techniques

Mastering Azure Security: Keeping your M
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to secure your Azure cloud workloads across applications and networks</span></span></li><li><span><span>Pr

Mastering Azure Security: Keeping your M
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to secure your Azure cloud workloads across applications and networks</span></span></li><li><span><span>Pr

Mastering Azure Security: Keeping your M
โœ Mustafa Toroman, Tom Janetscheck ๐Ÿ“‚ Library ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><span>Get to grips with artificial intelligence and cybersecurity techniques to respond to adversaries and incidents</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Learn how to secure your Azure cloud workloads across applications and networks</span></span></li><li><span><span>Pr

Learn Azure Sentinel: Integrate Azure se
โœ Richard Diver, Gary Bushey ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment</b></p> <h4>Key Features</h4> <ul><li>Secure your network, infrastructure, data, and applications on Microsoft Azure effectively </li> <li>Integrate artif

Learn Azure Sentinel: Integrate Azure se
โœ Richard Diver, Gary Bushey ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Packt Publishing ๐ŸŒ English

<p><b>Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment</b></p> <h4>Key Features</h4> <ul><li>Secure your network, infrastructure, data, and applications on Microsoft Azure effectively </li> <li>Integrate artif