Home Page Icon
Home Page
Table of Contents for
cover
Close
cover
by Mustafa Toroman, Tom Janetscheck
Mastering Azure Security
Mastering Azure Security
Why subscribe?
Contributors
About the authors
About the reviewer
Packt is searching for authors like you
Preface
Who this book is for?
What this book covers
To get the most out of this book
Download the example code files
Download the color images
Conventions used
Get in touch
Reviews
Section 1: Identity and Governance
Chapter 1: Introduction to Azure security
Exploring the shared responsibility model
On-premises
Infrastructure as a Service
Platform as a Service
Software as a Service
Division of security in the shared responsibility model
Physical security
Azure network
Azure infrastructure availability
Azure infrastructure integrity
Azure infrastructure monitoring
Understanding Azure security foundations
Summary
Questions
Chapter 2: Governance and Security
Understanding governance in Azure
Using common sense to avoid mistakes
Using management locks
Using management groups for governance
Understanding Azure Policy
Mode
Parameters
Parameter properties
Policy assignments
Initiative definitions
Initiative assignments
Policy best practices
Defining Azure blueprints
Blueprint definitions
Blueprint publishing
Azure Resource Graph
Querying Azure Resource Graph with PowerShell
Querying Azure Resource Graph with the Azure CLI
Advanced queries
Summary
Questions
Chapter 3: Managing Cloud Identities
Exploring passwords and passphrases
Dictionary attacks and password protection
Understanding Multi-Factor Authentication (MFA)
MFA activation in Azure AD
MFA activation from a user's perspective
Using Conditional Access
Named locations
Custom controls
Terms of use
Conditional Access policies
Assignments
Access controls
Introducing Azure AD Identity Protection
Azure AD Identity Protection at a glance
Risk detection
Creating a sign-in risk or user risk policy
Understanding RBAC
Creating custom RBAC roles
Protecting admin accounts with Azure AD PIM
Enabling PIM
Managing Azure AD roles in PIM
Managing Azure resources with PIM
Hybrid authentication and SSO
Understanding passwordless authentication
Global settings
Licensing considerations
Summary
Questions
Section 2: Cloud Infrastructure Security
Chapter 4: Azure Network Security
Understanding Azure Virtual Network
Connecting on-premises networks with Azure
Creating an S2S connection
Connecting a VNet to another VNet
VNet service endpoints
Considering other virtual networks' security
Azure Firewall deployment and configuration
Azure Firewall deployment
Understanding Azure Application Gateway
Understanding Azure Front Door
Summary
Questions
Chapter 5: Azure Key Vault
Understanding Azure Key Vault
Understanding access policies
Understanding service-to-service authentication
Understanding Managed Identities for Azure Resources
Using Azure Key Vault in deployment scenarios
Creating an Azure key vault and a secret
Key vault creation in PowerShell
Azure VM deployment
VM deployments with PowerShell
Referencing a key vault secret in Terraform
Referencing a key vault secret in ARM templates
Summary
Questions
Chapter 6: Data Security
Technical requirements
Understanding Azure Storage
Understanding Azure Virtual Machines disks
Summary
Questions
Section 3: Security Management
Chapter 7: Azure Security Center
Introducing Azure Security Center
Enabling Azure Security Center
Azure Secure Score and recommendations
Working with recommendations
The Azure Security Center community
Workflow automation and sections in Azure Security Center
Policy & compliance
Just-in-time VM access
Threat protection
Summary
Questions
Chapter 8: Azure Sentinel
Introduction to SIEM
Getting started with Azure Sentinel
Working with Azure Sentinel Dashboards
Setting up rules and alerts
Creating workbooks
Using threat hunting and notebooks
Using community resources
Summary
Questions
Chapter 9: Security Best Practices
Log Analytics design considerations
Understanding Azure SQL Database security features
Security in Azure App Service
Summary
Questions
Further reading
Assessments
Chapter 1: Azure Security Introduction
Chapter 2: Governance and Security
Chapter 3: Governance and Security
Chapter 4: Azure Network Security
Chapter 5: Azure Key Vault
Chapter 6: Data Security
Chapter 7: Azure Security Center
Chapter 8: Azure Sentinel
Chapter 9: Security Best Practices
Other Books You May Enjoy
Leave a review - let other readers know what you think
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Mastering Azure Security
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset