Book Image

Azure Architecture Explained

By : David Rendón, Brett Hargreaves
Book Image

Azure Architecture Explained

By: David Rendón, Brett Hargreaves

Overview of this book

Azure is a sophisticated technology that requires a detailed understanding to reap its full potential and employ its advanced features. This book provides you with a clear path to designing optimal cloud-based solutions in Azure, by delving into the platform's intricacies. You’ll begin by understanding the effective and efficient security management and operation techniques in Azure to implement the appropriate configurations in Microsoft Entra ID. Next, you’ll explore how to modernize your applications for the cloud, examining the different computation and storage options, as well as using Azure data solutions to help migrate and monitor workloads. You’ll also find out how to build your solutions, including containers, networking components, security principles, governance, and advanced observability. With practical examples and step-by-step instructions, you’ll be empowered to work on infrastructure-as-code to effectively deploy and manage resources in your environment. By the end of this book, you’ll be well-equipped to navigate the world of cloud computing confidently.
Table of Contents (20 chapters)
1
Part 1 – Effective and Efficient Security Management and Operations in Azure
5
Part 2 – Architecting Compute and Network Solutions
12
Part 3 – Making the Most of Infrastructure-as-Code for Azure

Understanding lateral movement

Threat actors or cyber attackers leverage several techniques to search for sensitive data and assets. Lateral movement refers to the technique of gaining initial access to organizational assets and extending access to other hosts or applications in an organization.

After gaining access to a compromised endpoint, the attacker can maintain access, move through the compromised environment, and search for sensitive data and other assets. The attacker can impersonate a legitimate user and access other network resources.

Imagine there’s an employee in your organization, Chris, who opens an email with a malicious attachment. Chris’s computer is compromised, so the threat actor can already start performing enumeration operations and gathering information about the internal systems.

Now, the threat actor can perform reconnaissance or credential or privilege gathering, and gain access to other assets in the network. Detecting and preventing...