Index
A
Active Directory Domain Services (AD DS)
Agent-based automation
Azure Active Directory (AAD)
Azure
Azure AD Conditional Access
conditional access
conditional access policies
default access management
definition
directory splitting
guest management
identity sources
intelligent security graph
privileged access management
Azure App Service
access control
Access Restrictions
API access
App Service Environment
built-in authentication
definition
Hybrid Connections
key vault access
logging
multitenant models
network
outbound traffic
security policies
storage access
Azure Blob storage
access control
account keys
anonymous access
data-plane
data-plane role-based access control
delegated access
shared keys
backup/disaster recovery
definition
GRS
LRS
logging
network
Azure Container Instance
access control, network
logs
network
Azure Container Registry
access control
Active Directory
data-plane RBAC
admin key
best practices
encryption keys
high availability
signed images
updated base image
filters
logging
network access
Azure Defender
Azure firewalls
Azure functions
access control
definition
logging
network
Azure Key Vault
access control
definition
logging
network
Azure Kubernetes Service
access control
Active Directory
RBAC
Azure Defender alerts
best practices
logs
network
application
control plane
Azure role-based access control
Azure Security Benchmark (ASB)
Azure Security Center
Azure SQL database
access control
authorization
Azure AD authentication
control-plane role-based access control roles
logging
network
SQL authentication
backup/disaster recovery
definition
Azure Tenant Security Solution (AzTS)
Azure virtual network
definition
IP addresses
Microsoft global network
B
Bring Your Own Key (BYOK)
C
Center for Internet Security (CIS)
Centralized log architecture
complex environments
enterprise environment
security
Cloud Adoption Framework
Cloud computing
Cloud-native security
Azure security building blocks
landing zone security
building blocks
detection/monitoring
IAM
network security
multi-cloud solutions
security architecture
Cloud security
building framework
cloud security framework
control frameworks
shared responsibility model
shifting security left
Cloud security posture management (CSPM)
Azure Security Center
AzTS
change tracking, security policies
definition
monitoring tools
security policy architecture
security policy initiatives
Cloud Workload Protection Platforms (CWPP)
Container registry
SeeAzure Container Registry
Container security
container image
Runtime security
Continuous deployment pipeline access
Customer-managed keys (CMK)
D, E
Data-plane security logs
F
Firewalls
SeeAzure firewalls
ftpsState property
G
Geo-redundant storage (GRS)
H
Hardware security module (HSM)
I
Identity and access management (IAM)
Identity solution as a service (IDaaS)
Indicators of compromise (IoC)
Infrastructure as a Service
administrative access
network security groups
virtual machines
Infrastructure monitoring
Intelligent Security Graph
J, K
Just-in-time access (JIT)
L
Locally redundant storage (LRS)
M
Microsoft-managed keys (MMK)
N
Network access
Network monitoring
forensic investigation
network layer alerts
NSG flow logs
WAF Access logs
O
Open Container Initiative (OCI)
Operating system images
P, Q
Platform as a service (PaaS)
Azure App Service
cross-network connectivity
firewall
outbound traffic
private endpoints
Platform monitoring
active logs
administrative
definition
deployment history
policy
security
service health
Azure AD
R
Recovery time objective (RTO)
remoteDebuggingEnabled property
Role-based access control (RBAC)
administrative roles
assignment life cycle
identity
locks
policies
role
scope
S, T, U
Sandbox environments
Secure Socket Tunneling Protocol (SSTP)
Security information and event management (SIEM)
Security operations center (SOC)
Service-level agreement (SLA)
Shared access signature (SAS)
Shared Image Gallery
Sherwood Applied Business Security Architecture (SABSA)
Software as a service (SaaS)
System for Cross-Domain Identity Management (SCIM)
V
Virtual machines
centrally managed virtual machines
security center alerts
See alsoAzure Defender
self-managed patching
self-managed virtual machines
Virtual private network (VPN)
Vulnerability scanner
W, X, Y, Z
Web Application Firewall (WAF)
See alsoAzure firewalls
Wide area network (WAN)
Windows Server Update Services (WSUS)
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
54.144.81.21