Book Image

Microsoft Azure Fundamentals Certification and Beyond

By : Steve Miles
Book Image

Microsoft Azure Fundamentals Certification and Beyond

By: Steve Miles

Overview of this book

This is the digital and cloud era, and Microsoft Azure is one of the top cloud computing platforms. It’s now more important than ever to understand how the cloud functions and the different services that can be leveraged across the cloud. This book will give you a solid understanding of cloud concepts and Microsoft Azure, starting by taking you through cloud concepts in depth, then focusing on the core Azure architectural components, solutions, and management tools. Next, you will understand security concepts, defense-in-depth, and key security services such as Network Security Groups and Azure Firewall, as well as security operations tooling such as Azure Security Center and Azure Sentinel. As you progress, you will understand how identity, governance, privacy, and compliance are managed in Azure. Finally, you will get to grips with cost management, service-level agreements, and service life cycles. Throughout, the book features a number of hands-on exercises to support the concepts, services, and solutions discussed. This provides you with a glimpse of real-world scenarios, before finally concluding with practice questions for AZ-900 exam preparation. By the end of this Azure book, you will have a thorough understanding of cloud concepts and Azure fundamentals, enabling you to pass the AZ-900 certification exam easily.
Table of Contents (21 chapters)
1
Section 1: Cloud Concepts
4
Section 2: Core Azure Services
7
Section 3: Core Solutions and Management Tools
10
Section 4: Security
12
Section 5: Identity, Governance, Privacy, and Compliance
16
Section 6: Cost Management and Service-Level Agreements

Defense in depth

DiD refers to a strategy that places multiple layers of different forms of defenses between attackers and the resources you are trying to protect.

Adopting a DiD strategy allows an organization to adopt a strong security posture and help ensure that all systems, data, and users are better protected from threats and compromise.

A DiD strategy means there is no single layer of protection or security service that is solely responsible for protecting resources, but by implementing many different types of defense at individual layers, you can slow down an attack path. It may successfully breach one defensive layer but be halted by subsequent protection layers, preventing the protected resource from being exposed.

The following screenshot shows that DiD as a concept is nothing new as a strategy; it can be considered the medieval castle concept of protecting resources:

Figure 7.5 – Medieval castle defense approach

The medieval castle...