Azure Security Handbook
eBook - ePub

Azure Security Handbook

A Comprehensive Guide for Defending Your Enterprise Environment

  1. English
  2. ePUB (mobile friendly)
  3. Only available on web
eBook - ePub

Azure Security Handbook

A Comprehensive Guide for Defending Your Enterprise Environment

Book details
Table of contents
Citations

About This Book

Did you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization's network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization.

This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigueand confusion. Throughout the book you will learn how to secure your applications using Azure's native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure.

What You Will Learn

  • Remediate security risks of Azure applications by implementing the right security controls at the right time
  • Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations
  • Protect the most common reference workloads according to security best practices
  • Design secure access control solutions for your Azure administrative access, as well as Azure application access

Who This Book Is For

Cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Azure Security Handbook by Karl Ots in PDF and/or ePUB format, as well as other popular books in Computer Science & Microsoft Programming. We have over one million books available in our catalogue for you to explore.

Information

Publisher
Apress
Year
2021
ISBN
9781484272923

Table of contents

  1. Cover
  2. Front Matter
  3. 1. Introduction to Cloud Security Architecture
  4. 2. Identity and Access Management
  5. 3. Logging and Monitoring
  6. 4. Network Security
  7. 5. Workload Protection – Data
  8. 6. Workload Protection – Platform as a Service
  9. 7. Workload Protection – Containers
  10. 8. Workload Protection – IaaS
  11. Back Matter