Azure security cookbook practical recipes for securing Azure resources and operations
Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks Purchase of the print or Kindle book includes a free PDF eBook Key Features Dive into practical recipes for implementing security solutions for Microsoft Azure resources Learn how to implement Microso...
Other Authors: | |
---|---|
Format: | eBook |
Language: | Inglés |
Published: |
Birmingham, England ; Mumbai :
Packt Publishing
[2023]
|
Edition: | 1st ed |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009730940006719 |
Table of Contents:
- Cover
- Title Page
- Copyright
- Dedication
- Contributors
- Table of Contents
- Preface
- Part 1: Azure Security Features
- Chapter 1: Securing Azure AD Identities
- Introduction to Azure Identity Services
- What is AD?
- Technical requirements
- Reviewing Azure AD Identity Secure Score
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Azure AD tenant Identity and Access Management
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Implementing Azure AD Password Protection
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing a Self-Service Password Reset
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Azure AD security defaults
- Getting ready
- How to do it….
- How it works…
- See also
- Implementing Azure AD multi-factor authentication
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Conditional Access policies
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing the Azure AD Identity Protection service
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Azure AD Privileged Identity Management
- Getting ready
- How to do it…
- How it works…
- See also
- Chapter 2: Securing Azure Networks
- Technical requirements
- Implementing network security groups
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Azure Firewall
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing Azure Web Application Firewall
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Implementing Azure DDoS
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Chapter 3: Securing Remote Access
- Technical requirements.
- Implementing Azure Network Adapter
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Implementing the Azure Bastion service
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Implementing JIT VM access
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Chapter 4: Securing Virtual Machines
- Technical requirements
- Implementing VM Update Management
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Implementing VM Microsoft Antimalware
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing VM Azure Disk Encryption
- Getting ready
- How to do it…
- How it works…
- There's more…
- See also
- Chapter 5: Securing Azure SQL Databases
- Technical requirements
- Implementing a service-level IP firewall
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing a private endpoint
- Getting ready
- How to do it…
- How it works….
- There's more…
- See also
- Implementing Azure AD authentication and authorization
- Getting ready
- How to do it…
- How it works…
- See also
- Chapter 6: Securing Azure Storage
- Technical requirements
- Implementing security settings on storage accounts
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing network security
- How to do it…
- How it works…
- There's more…
- See also
- Implementing encryption
- Getting ready
- How to do it…
- How it works…
- See also
- Part 2: Azure Security Tools
- Chapter 7: Using Advisor
- Technical requirements
- Reviewing the security recommendations
- Getting ready
- How to do it…
- How it works…
- See also
- Implementing the security recommendations
- Getting ready
- How to do it…
- How it works…
- See also.
- Chapter 8: Using Microsoft Defender for Cloud
- Technical requirements
- Terminology reference
- Review Defender for Cloud components
- Getting ready
- How to do it…
- How it works…
- See also
- Enable enhanced security features of Defender for Cloud
- Getting ready
- How to do it…
- How it works…
- See also
- Add a standard to the Regulatory compliance dashboard
- Getting ready
- How to do it…
- How it works…
- Assess your regulatory compliance
- Getting ready
- How to do it…
- How it works…
- See also
- Chapter 9: Using Microsoft Sentinel
- Technical requirements
- Terminology reference
- Enabling Microsoft Sentinel
- Getting ready
- How to do it…
- How it works…
- See also
- Reviewing Microsoft Sentinel components
- Getting ready
- How to do it…
- How it works…
- See also
- Creating automation
- Getting ready
- How to do it…
- How it works…
- See also
- Set up data connectors
- Getting ready
- How to do it…
- How it works…
- See also
- Chapter 10: Using Traffic Analytics
- Technical requirements
- Terminology reference
- Implementing traffic analytics
- Getting ready
- How to do it…
- How it works…
- See also
- Index
- About Packt
- Other Books You May Enjoy.