▶What You Will Learn
- Understand cloud security concepts
- Get to grips with managing cloud identities
- Adopt the Azure security cloud infrastructure
- Grasp Azure network security concepts
- Discover how to keep cloud resources secure
- Implement cloud governance with security policies and rules
▶Key Features
- Secure your Azure cloud workloads across applications and networks
- Protect your Azure infrastructure from cyber attacks
- Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices
▶Who This Book Is For
This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. A fundamental understanding of security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively.
▶What this book covers
- Chapter 1, Introduction to Azure Security, covers how the cloud is changing the concept of IT, and security is not an exception. Cybersecurity requires a different approach in the cloud and we need to understand what the differences are, new threats, and how to tackle them.
- Chapter 2, Governance and Security, goes into how to create policies and rules in Microsoft Azure in order to create standards, enforcing these policies and rules, and maintaining quality levels.
- Chapter 3, Managing Cloud Identities, explains why identity is one of the most important parts of security. With the cloud, identity is even more expressed than ever before. You'll learn how to keep identities secure and safe in Microsoft Azure and how to keep track of access rights and monitor any anomalies in user behavior.
- Chapter 4, Azure Network Security, covers how the network is the first line of defense in any environment. Keeping resources safe and unreachable by attackers is a very important part of security. You'll learn how to achieve this in Microsoft Azure with built-in or custom tools.
- Chapter 5, Azure KeyVault, explains how to manage secrets and certificates in Azure and deploy resources to Microsoft Azure with Infrastructure as Code in a secure way.
- Chapter 6, Data Security, covers how to protect data in the cloud with additional encryption using Microsoft or your own encryption key.
- Chapter 7, Azure Security Center, explains how to use ASC to detect threats in Microsoft Azure and how to view assessments, reports, and recommendations in order to increase Azure tenant security. It also looks at how to increase VM security by enabling just-in-time access.
- Chapter 8, Azure Sentinel, covers how to use Azure Sentinel to monitor security for your Azure and on-premise resources, including detecting threats before they happen and using artificial intelligence to analyze and investigate threats. Using Azure Sentinel to automate responses to security threats and stop them immediately is also covered.
- Chapter 9, Security Best Practices, introduces best practices for Azure security, including how to set up a bulletproof Azure environment, finding the hidden security features that are placed all over Azure, and other tools that may help you increase security in Microsoft Azure.