Azure Security Cookbook: Practical recipes for securing Azure resources and operations
- Length: 372 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2023-03-24
- ISBN-10: 1804617962
- ISBN-13: 9781804617960
- Sales Rank: #0 (See Top 100 Books)
Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks
Purchase of the print or Kindle book includes a free PDF eBook
Key Features
- Dive into practical recipes for implementing security solutions for Microsoft Azure resources
- Learn how to implement Microsoft Defender for Cloud and Microsoft Sentinel
- Work with real-world examples of Azure Platform security capabilities to develop skills quickly
Book Description
With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems.
This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you’ll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you’ll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you’ll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity.
By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources.
What you will learn
- Find out how to implement Azure security features and tools
- Understand how to provide actionable insights into security incidents
- Gain confidence in securing Azure resources and operations
- Shorten your time to value for applying learned skills in real-world cases
- Follow best practices and choices based on informed decisions
- Better prepare for Microsoft certification with a security element
Who this book is for
This book is for Azure security professionals, Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Microsoft Defender for Cloud and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. This book is also beneficial for those aiming to take Microsoft certification exams with a security element or focus.
Cover Title Page Copyright Dedication Contributors Table of Contents Preface Part 1: Azure Security Features Chapter 1: Securing Azure AD Identities Introduction to Azure Identity Services What is AD? Technical requirements Reviewing Azure AD Identity Secure Score Getting ready How to do it… How it works… See also Implementing Azure AD tenant Identity and Access Management Getting ready How to do it… How it works… There’s more… See also Implementing Azure AD Password Protection Getting ready How to do it… How it works… See also Implementing a Self-Service Password Reset Getting ready How to do it… How it works… See also Implementing Azure AD security defaults Getting ready How to do it…. How it works… See also Implementing Azure AD multi-factor authentication Getting ready How to do it… How it works… See also Implementing Conditional Access policies Getting ready How to do it… How it works… See also Implementing the Azure AD Identity Protection service Getting ready How to do it… How it works… See also Implementing Azure AD Privileged Identity Management Getting ready How to do it… How it works… See also Chapter 2: Securing Azure Networks Technical requirements Implementing network security groups Getting ready How to do it… How it works… See also Implementing Azure Firewall Getting ready How to do it… How it works… See also Implementing Azure Web Application Firewall Getting ready How to do it… How it works… There’s more… See also Implementing Azure DDoS Getting ready How to do it… How it works… There’s more… See also Chapter 3: Securing Remote Access Technical requirements Implementing Azure Network Adapter Getting ready How to do it… How it works… There’s more… See also Implementing the Azure Bastion service Getting ready How to do it… How it works… There’s more… See also Implementing JIT VM access Getting ready How to do it… How it works… There’s more… See also Chapter 4: Securing Virtual Machines Technical requirements Implementing VM Update Management Getting ready How to do it… How it works… There’s more… See also Implementing VM Microsoft Antimalware Getting ready How to do it… How it works… See also Implementing VM Azure Disk Encryption Getting ready How to do it… How it works… There’s more… See also Chapter 5: Securing Azure SQL Databases Technical requirements Implementing a service-level IP firewall Getting ready How to do it… How it works… See also Implementing a private endpoint Getting ready How to do it… How it works…. There’s more… See also Implementing Azure AD authentication and authorization Getting ready How to do it… How it works… See also Chapter 6: Securing Azure Storage Technical requirements Implementing security settings on storage accounts Getting ready How to do it… How it works… See also Implementing network security How to do it… How it works… There’s more… See also Implementing encryption Getting ready How to do it… How it works… See also Part 2: Azure Security Tools Chapter 7: Using Advisor Technical requirements Reviewing the security recommendations Getting ready How to do it… How it works… See also Implementing the security recommendations Getting ready How to do it… How it works… See also Chapter 8: Using Microsoft Defender for Cloud Technical requirements Terminology reference Review Defender for Cloud components Getting ready How to do it… How it works… See also Enable enhanced security features of Defender for Cloud Getting ready How to do it… How it works… See also Add a standard to the Regulatory compliance dashboard Getting ready How to do it… How it works… Assess your regulatory compliance Getting ready How to do it… How it works… See also Chapter 9: Using Microsoft Sentinel Technical requirements Terminology reference Enabling Microsoft Sentinel Getting ready How to do it… How it works… See also Reviewing Microsoft Sentinel components Getting ready How to do it… How it works… See also Creating automation Getting ready How to do it… How it works… See also Set up data connectors Getting ready How to do it… How it works… See also Chapter 10: Using Traffic Analytics Technical requirements Terminology reference Implementing traffic analytics Getting ready How to do it… How it works… See also Index About Packt Other Books You May Enjoy
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/PacktPublishing
2. In the Find a repository… box, search the book title: Azure Security Cookbook: Practical recipes for securing Azure resources and operations
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.