Description
Book SynopsisThis is a crisp, practical, and hands-on guide to movingmission-critical workloads to Azure. This book focuses on the process and technology aspects of Azuresecurity coupled with pattern-oriented, real-world examples. You will implement modernized security controls,catering to the needs of authentication, authorization, and auditing, thereby protecting the confidentialityand integrity of your infrastructure, applications, and data. The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn howto set up security policies and work with
Table of ContentsChapter 1: Introduction: Dimensions of cloud security
History about security and public cloudCloud security boundaries and responsibilitiesPattern-based securityAzure's defence-in-depth security architecture30 pages
Chapter 2: Identity and Access Management with Azure Active DirectoryIdentity protocols and application typesAzure active directory security modelActive directory federation servicesAzure AD Application proxyExploring Azure AD B2B and B2C for external partnersPIM Azure AD Identity protection hybrid implementationSingle sign on with Azure AD60 pages
Chapter 3: Network Security PatternsSoftware defined networksNetwork topologiesSegmenting subnetsControlling routing behaviourUsing gateways and firewalls30 pages
Chapter 4: Infrastructure Security PatternsPhysical securityBuilt in Azure security controlsAzure tenant securityContainer securitySecuring Azure resources30 pages
Chapter 5: Application and Data Security PatternsSecuring the application accessData classificationSecuring the data accessData encryption patterns30 pages
Chapter 6: Security ProcessesComplete mediation with threat modellingSecuring the infrastructure and application deploymentSecurity testingKey Management - Vulnerability managementDisaster recovery40 pages
Chapter 7: Automated Security MonitoringSetting up security policiesAdvanced observabilityAzure MonitorAzure Sentinel30 pages
Chapter 8: Creating a Security CultureLeadership supportTraining10 pages