Overview
- Covers Privileged Identity Management in Azure Active Directory
- Discusses security monitoring using Azure Sentinel and Azure Monitor
- Contains pattern oriented case studies for implementing modernized security controls
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
The book starts with an introduction to the various dimensions of cloud security, including pattern-based security and Azure's defense security architecture. You will then move on to identity and access management with Azure Active Directory. Here, you will learn the AAD security model, application proxy, and explore AAD B2B and B2C for external partners. Network security patterns and infrastructure security patterns are discussed next, followed by application and data security patterns. Finally, you will learn howto set up security policies and work with Azure Monitor and Azure Sentinel, and to create leadership support and training for a rigorous security culture.
After completing this book, you will understand and be able to implement reusable patterns for mission critical workloads, standardizing and expediting the move of those workloads to Azure.
What Will You Learn
- Understand security boundaries required to implement Azure's defense-in-depth security architecture
- Understand Azure Active Directory security model
- Master design patterns relating to network, infrastructure, and software
- Automate security monitoring with advanced observability and gain practical insights on how this can be implemented with Azure Monitor and Azure Sentinel
Developers and IT consultants/architects who are working on Azure.
Similar content being viewed by others
Table of contents (8 chapters)
Authors and Affiliations
About the author
Accessibility Information
PDF accessibility summary
This PDF does not fully comply with PDF/UA standards, but does feature limited screen reader support, described non-text content (images, graphs), bookmarks for easy navigation and searchable, selectable text. Users of assistive technologies may experience difficulty navigating or interpreting content in this document. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at [email protected].
EPUB accessibility summary
This ebook is designed with accessibility in mind, aiming to meet the ePub Accessibility 1.0 AA and WCAG 2.0 Level AA standards. Its features include descriptions for images and other non-text content, as well as rich navigation that is compatible with screen readers. We recognize the importance of accessibility, and we welcome queries about accessibility for any of our products. If you have a question or an access need, please get in touch with us at [email protected].
Bibliographic Information
Book Title: Azure Security For Critical Workloads
Book Subtitle: Implementing Modern Security Controls for Authentication, Authorization and Auditing
Authors: Sagar Lad
DOI: https://doi.org/10.1007/978-1-4842-8936-5
Publisher: Apress Berkeley, CA
eBook Packages: Professional and Applied Computing, Apress Access Books, Professional and Applied Computing (R0)
Copyright Information: Sagar Lad 2023
Softcover ISBN: 978-1-4842-8935-8Published: 11 December 2022
eBook ISBN: 978-1-4842-8936-5Published: 09 December 2022
Edition Number: 1
Number of Pages: XIII, 218
Number of Illustrations: 207 b/w illustrations
Topics: Microsoft and .NET