Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure supports cloud security operations and cloud security architects by supplying a path to clearly identify potential vulnerabilities to business assets and reduce security risk in Microsoft Azure subscription. This updated edition explores how to "lean-in" and recognize challenges with IaaS and PaaS for identity, networks, applications, virtual…mehr
Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.
Cyber Security on Azure supports cloud security operations and cloud security architects by supplying a path to clearly identify potential vulnerabilities to business assets and reduce security risk in Microsoft Azure subscription. This updated edition explores how to "lean-in" and recognize challenges with IaaS and PaaS for identity, networks, applications, virtual machines, databases, and data encryption to use the variety of Azure security tools. You will dive into Azure Cloud Security to guide cloud operations teams to become more security focused in many areas and laser focused on security configuration. New chapters cover Azure Kubernetes Service and Container security and you will get up and running quickly with an overview of Azure Sentinel SIEM Solution.
What You'll Learn Understand enterprise privileged identity and security policies "Shift left" with security controls in Microsoft Azure Configure intrusion detection and alertsReduce security risks using Azure Security Service Who This Book Is For IT, cloud, and security administrators in Azure
Marshall Copeland is a cloud security architect focused on helping customers "shift left" with cloud security defenses in Azure public cloud using cloud-native services and third-party network security appliances. He uses Infrastructure as Code (IaC) with ARM templates or Terraform HCL to build cloud infrastructure and disaster recovery solutions. Marshall's Azure security design skills include Azure Sentinel, Security Center, Policy, Firewall and ACL networking, and a few open-source solutions such as ELK stack, Wireshark, and Snort. He partners with security operations to guide cloud investigations to enhance "blue team hunting" efficiencies. Matthew Jacobs is a system engineer focused on cloud architecture technologies needed to support identity management, security, and collaboration tool sets for small and medium businesses, including enterprise organizations. His work has focused on digital transformation, including on-premise only, hybrid cloud networks, and complete public cloud-only deployment. Matthew brings a hands-on cloud architecture approach for Identity Management (IAM) and enhanced engineering to enable business agility that secures and supports a global remote work force. His current work in the Nashville, Tennessee area includes Fortune 500 media, entertainment, and hospitality companies, and his work history extends into public cloud federal compliance requirements for the banking and healthcare industries.
Inhaltsangabe
Part I: Zero Trust Cloud Security. - Chapter 1. Reduce Cybersecurity Vulnerabilities: Identity Layer. - Chapter 2. Azure Network Security Configuration. - Chapter 3. Reduce Cyber Security Vulnerabilities: IaaS and Data. - Part II: Azure Cloud Security Operations.- Chapter 4. Configure Azure Monitoring for Blue Team Hunting. - Chapter 5. Azure Security Center and Azure Sentinel. - Chapter 6. Azure Kubernetes Services: Container Security. - Chapter 7. Security Governance Operations.