Description

Book Synopsis
This is a crisp, practical, and hands-on guide to movingmission-critical workloads to Azure. This book focuses on the process and technology aspects of Azuresecurity coupled with pattern-oriented, real-world examples. You will implement modernized security controls,catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentialityand integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn howto set up security policies and work with

Table of Contents
​Chapter 1: Introduction: Dimensions of cloud security
History about security and public cloudCloud security boundaries and responsibilitiesPattern-based securityAzure's defence-in-depth security architecture30 pages
Chapter 2: Identity and Access Management with Azure Active DirectoryIdentity protocols and application typesAzure active directory security modelActive directory federation servicesAzure AD Application proxyExploring Azure AD B2B and B2C for external partnersPIM Azure AD Identity protection hybrid implementationSingle sign on with Azure AD60 pages
Chapter 3: Network Security PatternsSoftware defined networksNetwork topologiesSegmenting subnetsControlling routing behaviourUsing gateways and firewalls30 pages
Chapter 4: Infrastructure Security PatternsPhysical securityBuilt in Azure security controlsAzure tenant securityContainer securitySecuring Azure resources30 pages

Chapter 5: Application and Data Security PatternsSecuring the application accessData classificationSecuring the data accessData encryption patterns30 pages
Chapter 6: Security ProcessesComplete mediation with threat modellingSecuring the infrastructure and application deploymentSecurity testingKey Management - Vulnerability managementDisaster recovery40 pages
Chapter 7: Automated Security MonitoringSetting up security policiesAdvanced observabilityAzure MonitorAzure Sentinel30 pages
Chapter 8: Creating a Security CultureLeadership supportTraining10 pages

Azure Security For Critical Workloads

Product form

£24.74

Includes FREE delivery

RRP £32.99 – you save £8.25 (25%)

Order before 4pm tomorrow for delivery by Sat 17 Jan 2026.

A Paperback / softback by Sagar Lad

1 in stock


    View other formats and editions of Azure Security For Critical Workloads by Sagar Lad

    Publisher: APress
    Publication Date: 11/12/2022
    ISBN13: 9781484289358, 978-1484289358
    ISBN10: 1484289358

    Description

    Book Synopsis
    This is a crisp, practical, and hands-on guide to movingmission-critical workloads to Azure. This book focuses on the process and technology aspects of Azuresecurity coupled with pattern-oriented, real-world examples. You will implement modernized security controls,catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentialityand integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn howto set up security policies and work with

    Table of Contents
    ​Chapter 1: Introduction: Dimensions of cloud security
    History about security and public cloudCloud security boundaries and responsibilitiesPattern-based securityAzure's defence-in-depth security architecture30 pages
    Chapter 2: Identity and Access Management with Azure Active DirectoryIdentity protocols and application typesAzure active directory security modelActive directory federation servicesAzure AD Application proxyExploring Azure AD B2B and B2C for external partnersPIM Azure AD Identity protection hybrid implementationSingle sign on with Azure AD60 pages
    Chapter 3: Network Security PatternsSoftware defined networksNetwork topologiesSegmenting subnetsControlling routing behaviourUsing gateways and firewalls30 pages
    Chapter 4: Infrastructure Security PatternsPhysical securityBuilt in Azure security controlsAzure tenant securityContainer securitySecuring Azure resources30 pages

    Chapter 5: Application and Data Security PatternsSecuring the application accessData classificationSecuring the data accessData encryption patterns30 pages
    Chapter 6: Security ProcessesComplete mediation with threat modellingSecuring the infrastructure and application deploymentSecurity testingKey Management - Vulnerability managementDisaster recovery40 pages
    Chapter 7: Automated Security MonitoringSetting up security policiesAdvanced observabilityAzure MonitorAzure Sentinel30 pages
    Chapter 8: Creating a Security CultureLeadership supportTraining10 pages

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account