Book Image

Hands-On Cloud Administration in Azure

By : Mustafa Toroman
Book Image

Hands-On Cloud Administration in Azure

By: Mustafa Toroman

Overview of this book

Azure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud. Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recovery. You will also get to grips with Azure SQL Databases and the SQL on Azure VM concept. By the end of this book, you will have obtained practical experience of working with Azure services and Azure administration, along with maintaining, monitoring, and securing your Azure resources.
Table of Contents (13 chapters)

Demystifying cloud security

So, how secure is Azure really? Let's start by saying very secure.

Microsoft is investing heavily in Azure, and particularly in Azure Security. Azure has extensive compliance offerings, including HIPAA, FFIEC, PCI DSS, ISO 9001, and ISO 27001, just to name a few.

Azure Security starts with physical security. Data center has dedicated security staff around the clock; everything is covered by cameras and alarms, and there are several layers of perimeter checks.

To enter the Azure data center, you need to pass several checkpoints and provide valid authentication and authorization. Authentication is done on multi-factor levels, and besides providing a PIN or password, you must pass biometric and card reader checks as well.

Everything within data centers is encrypted and secure. All data is encrypted at rest, and even if someone manages to steal a...