Microsoft Azure Security Infrastructure

Book Description

Implement maximum control, , and compliance processes in cloud environments In Microsoft Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft with outstanding levels of control, security, and compliance. You’ll learn how to prepare infrastructure with Microsoft’s integrated tools, prebuilt templates, and managed services–and use these to help safely build and manage any enterprise, , web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You’ll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement–so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud evolve.

Three Microsoft Azure experts show you how to:

  • Understand cloud security boundaries and responsibilities
  • Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection
  • Explore Azure’s defense-in-depth security
  • Use Azure network security patterns and best practices
  • Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security
  • Help protect virtual machines with Microsoft Antimalware for Azure and Virtual Machines
  • Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information
  • Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite
  • Effectively model threats and plan protection for IoT systems
  • Use Azure security tools for operations, incident response, and forensic investigation

Table of Contents

Chapter 1 Cloud security
Chapter 2 Identity protection in Azure
Chapter 3 Azure network security
Chapter 4 Data and storage security
Chapter 5 Virtual machine protection with Antimalware
Chapter 6 Key management in Azure with Key Vault
Chapter 7 Azure resource management security
Chapter 8 Internet of Things security
Chapter 9 Hybrid environment monitoring
Chapter 10 Operations and management in the cloud

Book Details

File HostFree Download LinkFormatSize (MB)Upload Date
Uploaded Click to downloadTrue PDF5.701/10/2017
ZippyShare Click to downloadTrue PDF5.701/11/2017
How to Download? Report Dead Links & Get a Copy

Leave a Reply