Cargando…

Azure Architecture Explained A Comprehensive Guide to Building Effective Cloud Solutions /

Enhance your career as an Azure architect with cutting-edge tools, expert guidance, and resources from industry leaders Key Features Develop your business case for the cloud with technical guidance from industry experts Address critical business challenges effectively by leveraging proven combinatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Rendón, David (Autor), Hargreaves, Brett (Autor)
Otros Autores: Kong, Sarah (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2023.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright and Credits
  • Foreword
  • Contributors
  • Table of Contents
  • Preface
  • Part 1
  • Effective and Efficient Security Management and Operations in Azure
  • Chapter 1: Identity Foundations with Azure Active Directory and Microsoft Entra
  • Protecting users' identities and securing the value chain
  • the importance of IAM in decentralized organizations
  • Authentication and authorization in Azure
  • Engaging and collaborating with employees, partners, and customers
  • The significance of digital identities in the modern IT landscape
  • Modernizing your IAM with Microsoft Azure AD
  • Life cycle management
  • Leveraging the Microsoft Cloud Adoption Framework
  • Azure AD terminology, explained
  • Securing applications with the Microsoft identity platform
  • Securing cloud-based workloads with Microsoft Entra's identity-based access control
  • Azure AD
  • Microsoft Entra Permissions Management
  • Microsoft Entra Verified ID
  • Microsoft Entra workload identities
  • Microsoft Entra Identity Governance
  • Microsoft Entra admin center
  • Summary
  • Chapter 2: Managing Access to Resources Using Azure Active Directory
  • Understanding the need for IAM
  • Understanding Azure AD (now Microsoft Entra ID)
  • Exploring the Microsoft Entra ID editions
  • Microsoft Entra ID Premium P2
  • Understanding the capabilities of Microsoft Entra ID
  • Task 1
  • creating a new Azure AD tenant using the Azure portal
  • Task 2
  • creating and configuring Azure AD users
  • Task 3
  • creating an Azure AD group with dynamic membership
  • Hybrid identity
  • integrating your on-premises directories (Azure AD Connect sync and cloud sync)
  • Azure AD Connect sync
  • Azure AD Connect cloud sync
  • Azure AD Application Proxy
  • Azure AD Conditional Access
  • Azure AD PIM
  • Assigning roles in PIM
  • Summary
  • Chapter 3: Using Microsoft Sentinel to Mitigate Lateral Movement Paths
  • Understanding the Zero Trust strategy
  • Understanding lateral movement
  • Leveraging Microsoft Sentinel to improve your security posture
  • Collecting data
  • Detecting threats
  • Investigating anomalies
  • Responding to incidents
  • Enabling Microsoft Sentinel
  • Global prerequisites
  • Enabling Microsoft Sentinel using the Bicep language
  • Enabling Microsoft Sentinel using the Azure portal
  • Setting up data connectors
  • Mitigating lateral movements
  • An Office 365 impersonation following a suspicious Azure AD sign-in
  • Suspicious inbox manipulation rules set following suspicious Azure AD sign-in
  • Summary
  • Part 2
  • Architecting Compute and Network Solutions
  • Chapter 4: Understanding Azure Data Solutions
  • Technical requirements
  • Understanding Azure storage types
  • Structured data
  • Unstructured data
  • Semi-structured data
  • Azure storage accounts
  • Understanding Azure database options
  • Azure SQL
  • Azure Cosmos DB
  • Creating a Cosmos DB account
  • Summary
  • Chapter 5: Migrating to the Cloud