Book Image

Hands-On Cloud Administration in Azure

By : Mustafa Toroman
Book Image

Hands-On Cloud Administration in Azure

By: Mustafa Toroman

Overview of this book

Azure continues to dominate the public cloud market and grow rapidly thanks to a number of recent innovations. Azure's wide range of services and support has led to a large number of customers switching to Azure cloud. Hands-On Cloud Administration in Azure starts with the basics of Azure cloud fundamentals and key concepts of the cloud computing ecosystem and services. Then, you will gradually get acquainted with core services provided by Azure, including Azure VNet, types and assignments of IP addresses, and network security groups. You will also work on creating and administering Azure Virtual Machines, types of virtual machines (VMs), and design VM solutions based on computing workloads. As you make your way through the chapters, you will explore Azure App Service, discover how to host your web apps in Azure, and monitor and troubleshoot them. In the concluding chapters, you will learn more complex and abstract services, such as Azure Storage, Azure Backup, and Azure Site Recovery. You will also get to grips with Azure SQL Databases and the SQL on Azure VM concept. By the end of this book, you will have obtained practical experience of working with Azure services and Azure administration, along with maintaining, monitoring, and securing your Azure resources.
Table of Contents (13 chapters)

Encryption

Another important step in security is encryption. We want our data to be encrypted always—in rest and transit. Everything is redundant to ensure there is no data is lost, and even with three copies of that, all of them encrypted, we have the option to create additional redundancy with geo-replication and other settings.

All resources in Azure are encrypted at rest by default. But sometimes we need additional security to ensure data is more protected. For example, disks for our Azure VMs are encrypted inside the Azure data center, and even if the disk was accessed without authorization, no one could read data on that disk. But what if the disk was downloaded? In this case, the disk could be used. Data could be read or attached to another VM, or a VM could be created with that disk.

We can apply additional encryption and make our resources more secure by using...