Book Image

Azure Integration Guide for Business

By : Joshua Garverick, Jack Lee, Mélony Qin, Trevoir Williams
Book Image

Azure Integration Guide for Business

By: Joshua Garverick, Jack Lee, Mélony Qin, Trevoir Williams

Overview of this book

Azure Integration Guide for Business is essential for decision makers planning to transform their business with Microsoft Azure. The Microsoft Azure cloud platform can improve the availability, scalability, and cost-efficiency of any business. The guidance in this book will help decision makers gain valuable insights into proactively managing their applications and infrastructure. You'll learn to apply best practices in Azure Virtual Network and Azure Storage design, ensuring an efficient and secure cloud infrastructure. You'll also discover how to automate Azure through Infrastructure as Code (IaC) and leverage various Azure services to support OLTP applications. Next, you’ll explore how to implement Azure offerings for event-driven architectural solutions and serverless applications. Additionally, you’ll gain in-depth knowledge on how to develop an automated, secure, and scalable solutions. Core elements of the Azure ecosystem will be discussed in the final chapters of the book, such as big data solutions, cost governance, and best practices to help you optimize your business. By the end of this book, you’ll understand what a well-architected Azure solution looks like and how to lead your organization toward a tailored Azure solution that meets your business needs.
Table of Contents (15 chapters)

Microsoft Cybersecurity Reference Architecture

Cybersecurity comprises a set of best practices to protect internet-connected systems, including hardware, software, and data, from digital attacks. It is designed to prevent the unauthorized access, use, disclosure, disruption, modification, or destruction of information. Cybersecurity strategies encompass various measures to ensure data confidentiality, integrity, and availability.

The Microsoft Cybersecurity Reference Architecture (MCRA) delineates the layers of security control and best practices around Microsoft’s array of services and products. It showcases how components combine and should interact to create a secure enterprise environment. MCRA answers the following questions:

  • What security features exist in the Azure platform?
  • How are users and resources validated and authenticated, and what authorizations do persons have?
  • What native tools does Azure provide for security management?
  • What other cloud...