Azure Security Cookbook Practical Recipes for Securing Azure Resources and Operations /
Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microso...
Call Number: | Libro Electrónico |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Birmingham :
Packt Publishing, Limited,
2023.
|
Subjects: | |
Online Access: | Texto completo (Requiere registro previo con correo institucional) |
Table of Contents:
- Cover
- Title Page
- Copyright
- Dedication
- Contributors
- Table of Contents
- Preface
- Part 1: Azure Security Features
- Chapter 1: Securing Azure AD Identities
- Introduction to Azure Identity Services
- What is AD?
- Technical requirements
- Reviewing Azure AD Identity Secure Score
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Azure AD tenant Identity and Access Management
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Implementing Azure AD Password Protection
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing a Self-Service Password Reset
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Azure AD security defaults
- Getting ready
- How to do it....
- How it works...
- See also
- Implementing Azure AD multi-factor authentication
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Conditional Access policies
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing the Azure AD Identity Protection service
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Azure AD Privileged Identity Management
- Getting ready
- How to do it...
- How it works...
- See also
- Chapter 2: Securing Azure Networks
- Technical requirements
- Implementing network security groups
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Azure Firewall
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing Azure Web Application Firewall
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Implementing Azure DDoS
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Chapter 3: Securing Remote Access
- Technical requirements
- Implementing Azure Network Adapter
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Implementing the Azure Bastion service
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Implementing JIT VM access
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Chapter 4: Securing Virtual Machines
- Technical requirements
- Implementing VM Update Management
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Implementing VM Microsoft Antimalware
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing VM Azure Disk Encryption
- Getting ready
- How to do it...
- How it works...
- There's more...
- See also
- Chapter 5: Securing Azure SQL Databases
- Technical requirements
- Implementing a service-level IP firewall
- Getting ready
- How to do it...
- How it works...
- See also
- Implementing a private endpoint
- Getting ready
- How to do it...
- How it works....
- There's more...
- See also
- Implementing Azure AD authentication and authorization
- Getting ready