Book Image

Microsoft Azure Security

Book Image

Microsoft Azure Security

Overview of this book

Table of Contents (12 chapters)

Virtual Machines


VMs are the most configurable execution environments for applications that Azure provides. With VMs, we can run arbitrary workloads, custom tools, and applications, but we need to manage and maintain them directly, including the security.

Physical security is, however, handled by Microsoft, as well as every measure to guarantee the logical isolation between different customers.

External security

As mentioned before, external security refers to all those measures that we can provide exclusive of the running VM. Taking VM as a black box model, external security involves what happens outside it.

Before having control over a VM, we need to first create it. Regarding the underlying operating system, a different setup could be required for Linux and Windows, for example. After doing this, in a basic scenario, we would probably want to connect to that instance to administrate it. In order to do this, we configure the endpoints and ACLs.

How does isolation help in building safe solutions...