Book Image

Optimizing Microsoft Azure Workloads

By : Rithin Skaria
Book Image

Optimizing Microsoft Azure Workloads

By: Rithin Skaria

Overview of this book

It’s easy to learn and deploy resources in Microsoft Azure, without worrying about resource optimization. However, for production or mission critical workloads, it’s crucial that you follow best practices for resource deployment to attain security, reliability, operational excellence and performance. Apart from these aspects, you need to account for cost considerations, as it’s the leading reason for almost every organization’s cloud transformation. In this book, you’ll learn to leverage Microsoft Well-Architected Framework to optimize your workloads in Azure. This Framework is a set of recommended practices developed by Microsoft based on five aligned pillars; cost optimization, performance, reliability, operational excellence, and security. You’ll explore each of these pillars and discover how to perform an assessment to determine the quality of your existing workloads. Through the book, you’ll uncover different design patterns and procedures related to each of the Well-Architected Framework pillars. By the end of this book, you’ll be well-equipped to collect and assess data from an Azure environment and perform the necessary upturn of your Azure workloads.
Table of Contents (14 chapters)
1
Part 1: Well-Architected Framework Fundamentals
4
Part 2: Exploring the Well-Architected Framework Pillars and Their Principles
10
Part 3: Assessment and Recommendations

Leveraging the Security Pillar

In on-premises systems, the data center and infrastructure are fully managed by the organization, and it is the organization’s responsibility to secure its environment. Security is a complex topic, and it raises a lot of questions when the organization adopts a public cloud such as Microsoft Azure. Nowadays, attacks are getting more sophisticated, and attackers are improvising their techniques. So, we need to increase the security landscape of our environment to cope with these attackers. Attackers target vulnerabilities in system configurations, operational methods, and the way the users handle their devices. People who want to exploit your vulnerabilities will constantly scan your environment for security gaps; at the right moment, they will penetrate and compromise your environment. These days, most organizations store customer data, and when this data is compromised, it ruins your reputation. With the help of best practices outlined in the...