0%

Book Description

Leverage Azure security services to architect robust cloud solutions in Microsoft Azure

Key Features

  • Secure your Azure cloud workloads across applications and networks
  • Protect your Azure infrastructure from cyber attacks
  • Discover tips and techniques for implementing, deploying, and maintaining secure cloud services using best practices

Book Description

Security is always integrated into cloud platforms, causing users to let their guard down as they take cloud security for granted.Cloud computing brings new security challenges, but you can overcome these with Microsoft Azure's shared responsibility model. Mastering Azure Security covers the latest security features provided by Microsoft to identify different threats and protect your Azure cloud using innovative techniques. The book takes you through the built-in security controls and the multi-layered security features offered by Azure to protect cloud workloads across apps and networks. You'll get to grips with using Azure Security Center for unified security management, building secure application gateways on Azure, protecting the cloud from DDoS attacks, safeguarding with Azure Key Vault, and much more. Additionally, the book covers Azure Sentinel, monitoring and auditing, Azure security and governance best practices, and securing PaaS deployments. By the end of this book, you'll have developed a solid understanding of cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure.

What you will learn

  • Understand cloud security concepts
  • Get to grips with managing cloud identities
  • Adopt the Azure security cloud infrastructure
  • Grasp Azure network security concepts
  • Discover how to keep cloud resources secure
  • Implement cloud governance with security policies and rules

Who this book is for

This book is for Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Azure Security Centre and other Azure security features. A fundamental understanding of security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively.

Table of Contents

  1. Mastering Azure Security
  2. Why subscribe?
  3. Contributors
  4. About the authors
  5. About the reviewer
  6. Packt is searching for authors like you
  7. Preface
    1. Who this book is for?
    2. What this book covers
    3. To get the most out of this book
    4. Download the example code files
    5. Download the color images
    6. Conventions used
    7. Get in touch
    8. Reviews
  8. Section 1: Identity and Governance
  9. Chapter 1: Introduction to Azure security
    1. Exploring the shared responsibility model
      1. On-premises
      2. Infrastructure as a Service
      3. Platform as a Service
      4. Software as a Service
      5. Division of security in the shared responsibility model
    2. Physical security
    3. Azure network
    4. Azure infrastructure availability
    5. Azure infrastructure integrity
    6. Azure infrastructure monitoring
    7. Understanding Azure security foundations
    8. Summary
    9. Questions
  10. Chapter 2: Governance and Security
    1. Understanding governance in Azure
    2. Using common sense to avoid mistakes
    3. Using management locks
    4. Using management groups for governance
    5. Understanding Azure Policy
      1. Mode
      2. Parameters
        1. Parameter properties
      3. Policy assignments
      4. Initiative definitions
      5. Initiative assignments
      6. Policy best practices
    6. Defining Azure blueprints
      1. Blueprint definitions
      2. Blueprint publishing
    7. Azure Resource Graph
      1. Querying Azure Resource Graph with PowerShell
      2. Querying Azure Resource Graph with the Azure CLI
      3. Advanced queries
    8. Summary
    9. Questions
  11. Chapter 3: Managing Cloud Identities
    1. Exploring passwords and passphrases
      1. Dictionary attacks and password protection
    2. Understanding Multi-Factor Authentication (MFA)
      1. MFA activation in Azure AD
      2. MFA activation from a user's perspective
    3. Using Conditional Access
      1. Named locations
      2. Custom controls
      3. Terms of use
      4. Conditional Access policies
        1. Assignments
        2. Access controls
    4. Introducing Azure AD Identity Protection
      1. Azure AD Identity Protection at a glance
        1. Risk detection
        2. Creating a sign-in risk or user risk policy
    5. Understanding RBAC
      1. Creating custom RBAC roles
    6. Protecting admin accounts with Azure AD PIM
      1. Enabling PIM
      2. Managing Azure AD roles in PIM
      3. Managing Azure resources with PIM
    7. Hybrid authentication and SSO
    8. Understanding passwordless authentication
      1. Global settings
    9. Licensing considerations
    10. Summary
    11. Questions
  12. Section 2: Cloud Infrastructure Security
  13. Chapter 4: Azure Network Security
    1. Understanding Azure Virtual Network
      1. Connecting on-premises networks with Azure
      2. Creating an S2S connection
      3. Connecting a VNet to another VNet
      4. VNet service endpoints
    2. Considering other virtual networks' security
      1. Azure Firewall deployment and configuration
        1. Azure Firewall deployment
    3. Understanding Azure Application Gateway
    4. Understanding Azure Front Door
    5. Summary
    6. Questions
  14. Chapter 5: Azure Key Vault
    1. Understanding Azure Key Vault
      1. Understanding access policies
    2. Understanding service-to-service authentication
      1. Understanding Managed Identities for Azure Resources
    3. Using Azure Key Vault in deployment scenarios
      1. Creating an Azure key vault and a secret
        1. Key vault creation in PowerShell
      2. Azure VM deployment
        1. VM deployments with PowerShell
        2. Referencing a key vault secret in Terraform
        3. Referencing a key vault secret in ARM templates
    4. Summary
    5. Questions
  15. Chapter 6: Data Security
    1. Technical requirements
    2. Understanding Azure Storage
    3. Understanding Azure Virtual Machines disks
    4. Summary
    5. Questions
  16. Section 3: Security Management
  17. Chapter 7: Azure Security Center
    1. Introducing Azure Security Center
      1. Enabling Azure Security Center
    2. Azure Secure Score and recommendations
      1. Working with recommendations
    3. The Azure Security Center community
    4. Workflow automation and sections in Azure Security Center
      1. Policy & compliance
        1. Just-in-time VM access
      2. Threat protection
    5. Summary
    6. Questions
  18. Chapter 8: Azure Sentinel
    1. Introduction to SIEM
    2. Getting started with Azure Sentinel
      1. Working with Azure Sentinel Dashboards
      2. Setting up rules and alerts
    3. Creating workbooks
      1. Using threat hunting and notebooks
      2. Using community resources
    4. Summary
    5. Questions
  19. Chapter 9: Security Best Practices
    1. Log Analytics design considerations
    2. Understanding Azure SQL Database security features
    3. Security in Azure App Service
    4. Summary
    5. Questions
    6. Further reading
  20. Assessments
    1. Chapter 1: Azure Security Introduction
    2. Chapter 2: Governance and Security
    3. Chapter 3: Governance and Security
    4. Chapter 4: Azure Network Security
    5. Chapter 5: Azure Key Vault
    6. Chapter 6: Data Security
    7. Chapter 7: Azure Security Center
    8. Chapter 8: Azure Sentinel
    9. Chapter 9: Security Best Practices
  21. Other Books You May Enjoy
    1. Leave a review - let other readers know what you think
3.141.41.187