Cargando…

Cyber security on Azure : an it professional's guide to Microsoft Azure security /

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure supports cloud security operations and cloud sec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Copeland, Marshall, Jacobs, Matthew (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, 2021.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • About the Authors
  • About the Technical Reviewer
  • Acknowledgments
  • Introduction
  • Part I: Zero Trust Cloud Security
  • Chapter 1: Reduce Cyber Security Vulnerabilities: Identity Layer
  • Azure Cloud Relations: Tenant, Subscription, Resources
  • Azure Tenant Security
  • Azure Subscription Security
  • Azure API Security
  • Azure Resource Locks
  • Managing Azure Active Directory: Users and Groups
  • Azure Users
  • Azure Groups
  • Azure Active Directory: OAuth, SAML, AD Connect
  • OAuth
  • SAML
  • AD Connect
  • Federation with ADFS
  • Non-federation
  • Security Measures
  • Azure Application Permission Scopes
  • Configure Multi-Factor Authentication
  • Enabling Security Defaults
  • Self-Service Password Reset
  • Conditional Access Policies
  • Azure AD Privileged Identity Management
  • Summary
  • Chapter 2: Azure Network Security Configuration
  • Virtual Network Overview
  • VNets
  • Network Security Group
  • VNet Security Best Practices
  • Network Peering
  • Application Security Groups
  • TCP/IP Port Vulnerability
  • Azure Front Door Service
  • Remote Access Management
  • Azure Bastion Host
  • Summary
  • Chapter 3: Reduce Cyber Security Vulnerabilities: IaaS and Data
  • Azure Security with IaC
  • ARM Development
  • Harden Azure VMs
  • Patching the VM Directly
  • VM Security and Endpoint Protection
  • Database Security
  • DB Best Practices
  • DB Authentication
  • Database Auditing
  • Storage Accounts
  • Shared Access Signatures
  • Key Management
  • Summary
  • Part II: Azure Cloud Security Operations
  • Chapter 4: Configure Azure Monitoring for Blue Team Hunting
  • Azure Data Platform
  • Azure Logs
  • Azure Metrics
  • Azure Monitor and Log Analytics Enablement
  • Log Analytics Workspace Security Strategy
  • Guest OS Metrics and Logs
  • Connecting Data Sources to Log Analytics Workspace
  • Summary
  • Chapter 5: Azure Security Center and Azure Sentinel
  • Cloud Security Challenges
  • Enable Security
  • Configuration Value
  • Standard Tier Advantages
  • Just-in-Time Access
  • Advanced Threat Detection
  • Anomaly Detection
  • Crash Analysis
  • Threat Intelligence
  • Behavioral Analysis
  • Configure Alerting
  • Using Security Center
  • Compute and Apps
  • Network
  • Data and Storage
  • Azure Sentinel
  • Connect to Data Streams
  • Using Azure Sentinel
  • Logs Pane
  • Analytics Pane
  • Hunting
  • Summary
  • Chapter 6: Azure Kubernetes Services: Container Security
  • Microservices
  • Containers, Docker, and Kubernetes
  • Azure Kubernetes Services and Security
  • Authentication
  • Container Security
  • AKS Security with Security Center and Sentinel
  • Kubernetes Security with Azure Policy
  • Summary
  • Chapter 7: Security Governance Operations
  • Azure Governance Architecture
  • Management Groups
  • Azure Policy
  • Compliance Reporting
  • Assignments
  • Blueprints
  • Role-Based Access Control
  • Azure Cost Management
  • Data Governance