Loading…

Azure Security Cookbook Practical Recipes for Securing Azure Resources and Operations /

Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microso...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Miles, Steve (Author)
Format: Electronic eBook
Language:Inglés
Published: Birmingham : Packt Publishing, Limited, 2023.
Subjects:
Online Access:Texto completo (Requiere registro previo con correo institucional)
Table of Contents:
  • Cover
  • Title Page
  • Copyright
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Azure Security Features
  • Chapter 1: Securing Azure AD Identities
  • Introduction to Azure Identity Services
  • What is AD?
  • Technical requirements
  • Reviewing Azure AD Identity Secure Score
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Azure AD tenant Identity and Access Management
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Implementing Azure AD Password Protection
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing a Self-Service Password Reset
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Azure AD security defaults
  • Getting ready
  • How to do it....
  • How it works...
  • See also
  • Implementing Azure AD multi-factor authentication
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Conditional Access policies
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing the Azure AD Identity Protection service
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Azure AD Privileged Identity Management
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Chapter 2: Securing Azure Networks
  • Technical requirements
  • Implementing network security groups
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Azure Firewall
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing Azure Web Application Firewall
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Implementing Azure DDoS
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Chapter 3: Securing Remote Access
  • Technical requirements
  • Implementing Azure Network Adapter
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Implementing the Azure Bastion service
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Implementing JIT VM access
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Chapter 4: Securing Virtual Machines
  • Technical requirements
  • Implementing VM Update Management
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Implementing VM Microsoft Antimalware
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing VM Azure Disk Encryption
  • Getting ready
  • How to do it...
  • How it works...
  • There's more...
  • See also
  • Chapter 5: Securing Azure SQL Databases
  • Technical requirements
  • Implementing a service-level IP firewall
  • Getting ready
  • How to do it...
  • How it works...
  • See also
  • Implementing a private endpoint
  • Getting ready
  • How to do it...
  • How it works....
  • There's more...
  • See also
  • Implementing Azure AD authentication and authorization
  • Getting ready