Azure security cookbook practical recipes for securing Azure resources and operations

Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microso...

Full description

Bibliographic Details
Other Authors: Miles, Steve, author (author)
Format: eBook
Language:Inglés
Published: Birmingham, England ; Mumbai : Packt Publishing [2023]
Edition:1st ed
Subjects:
See on Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009730940006719
Table of Contents:
  • Cover
  • Title Page
  • Copyright
  • Dedication
  • Contributors
  • Table of Contents
  • Preface
  • Part 1: Azure Security Features
  • Chapter 1: Securing Azure AD Identities
  • Introduction to Azure Identity Services
  • What is AD?
  • Technical requirements
  • Reviewing Azure AD Identity Secure Score
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Azure AD tenant Identity and Access Management
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing Azure AD Password Protection
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing a Self-Service Password Reset
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Azure AD security defaults
  • Getting ready
  • How to do it….
  • How it works…
  • See also
  • Implementing Azure AD multi-factor authentication
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Conditional Access policies
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing the Azure AD Identity Protection service
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Azure AD Privileged Identity Management
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Chapter 2: Securing Azure Networks
  • Technical requirements
  • Implementing network security groups
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Azure Firewall
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing Azure Web Application Firewall
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing Azure DDoS
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Chapter 3: Securing Remote Access
  • Technical requirements.
  • Implementing Azure Network Adapter
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing the Azure Bastion service
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing JIT VM access
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Chapter 4: Securing Virtual Machines
  • Technical requirements
  • Implementing VM Update Management
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing VM Microsoft Antimalware
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing VM Azure Disk Encryption
  • Getting ready
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Chapter 5: Securing Azure SQL Databases
  • Technical requirements
  • Implementing a service-level IP firewall
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing a private endpoint
  • Getting ready
  • How to do it…
  • How it works….
  • There's more…
  • See also
  • Implementing Azure AD authentication and authorization
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Chapter 6: Securing Azure Storage
  • Technical requirements
  • Implementing security settings on storage accounts
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing network security
  • How to do it…
  • How it works…
  • There's more…
  • See also
  • Implementing encryption
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Part 2: Azure Security Tools
  • Chapter 7: Using Advisor
  • Technical requirements
  • Reviewing the security recommendations
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Implementing the security recommendations
  • Getting ready
  • How to do it…
  • How it works…
  • See also.
  • Chapter 8: Using Microsoft Defender for Cloud
  • Technical requirements
  • Terminology reference
  • Review Defender for Cloud components
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Enable enhanced security features of Defender for Cloud
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Add a standard to the Regulatory compliance dashboard
  • Getting ready
  • How to do it…
  • How it works…
  • Assess your regulatory compliance
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Chapter 9: Using Microsoft Sentinel
  • Technical requirements
  • Terminology reference
  • Enabling Microsoft Sentinel
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Reviewing Microsoft Sentinel components
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Creating automation
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Set up data connectors
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Chapter 10: Using Traffic Analytics
  • Technical requirements
  • Terminology reference
  • Implementing traffic analytics
  • Getting ready
  • How to do it…
  • How it works…
  • See also
  • Index
  • About Packt
  • Other Books You May Enjoy.