Book Image

Azure for Decision Makers

By : Jack Lee, Jason Milgram, David Rendón
2 (1)
Book Image

Azure for Decision Makers

2 (1)
By: Jack Lee, Jason Milgram, David Rendón

Overview of this book

Azure for Decision Makers provides a comprehensive overview of the latest updates in cloud security, hybrid cloud and multi-cloud solutions, and cloud migration in Azure. This book is a must-have introduction to the Microsoft Azure cloud platform, demonstrating the substantial scope of digital transformation and innovation that can be achieved with Azure's capabilities. The first set of chapters will get you up to speed with Microsoft Azure's evolution before showing you how to integrate it into your existing IT infrastructure. Next, you’ll gain practical insights into application migration and modernization, focusing mainly on migration planning, implementation, and best practices. Throughout the book, you’ll get the information you need to spearhead a smooth migration and modernization process, detailing Azure infrastructure as a service (IaaS) deployment, infrastructure management, and key application architectures. The concluding chapters will help you to identify and incorporate best practices for cost optimization and management, Azure DevOps, and Azure automation. By the end of this book, you’ll have learned how to lead end-to-end Azure operations for your organization and effectively cost-optimize your processes ─ from the planning and cloud migration stage through to troubleshooting.
Table of Contents (10 chapters)
7
Next Steps

Summary

This chapter covered the Azure security benefits for organizations, including identity and access management and best practices for securing workloads on Azure. Microsoft Sentinel was also discussed as a tool for intelligent security analytics and threat intelligence across the enterprise.

The Microsoft cloud security benchmark was introduced as a resource for security recommendations on Azure workloads. Microsoft Defender for Cloud was introduced as a solution for threat visibility, detection, and response across multiple cloud platforms. Additionally, we discussed Microsoft Defender for Identity and Microsoft Defender for Endpoint, which are tools for identifying suspicious activity and preventing advanced targeted attacks.

Finally, Microsoft Defender for Cloud Apps was presented as a way to enable visibility and control over cloud usage for protecting sensitive data and regulatory compliance. The importance of data protection and the role of IAM solutions in ensuring...