Book Image

Azure Strategy and Implementation Guide, Fourth Edition - Fourth Edition

By : Aaditya Pokkunuri, Jack Lee, Greg Leonardo, Jason Milgram, David Rendón
Book Image

Azure Strategy and Implementation Guide, Fourth Edition - Fourth Edition

By: Aaditya Pokkunuri, Jack Lee, Greg Leonardo, Jason Milgram, David Rendón

Overview of this book

Microsoft Azure is a powerful cloud computing platform that offers a multitude of services and capabilities for organizations of any size moving to a cloud strategy. This fourth edition comes with the latest updates on cloud security fundamentals, hybrid cloud, cloud migration, Microsoft Azure Active Directory, and Windows Virtual Desktop. It encapsulates the entire spectrum of measures involved in Azure deployment that includes understanding Azure fundamentals, choosing a suitable cloud architecture, building on design principles, becoming familiar with Azure DevOps, and learning best practices for optimization and management. The book begins by introducing you to the Azure cloud platform and demonstrating the substantial scope of digital transformation and innovation that can be achieved with Azure's capabilities. The guide also acquaints you with practical insights into application modernization, Azure Infrastructure as a Service (IaaS) deployment, infrastructure management, key application architectures, best practices of Azure DevOps, and Azure automation. By the end of this book, you will have acquired the skills required to drive Azure operations from the planning and cloud migration stage to cost management and troubleshooting.
Table of Contents (10 chapters)
8
8. Conclusion
9
Index

Best practices for securing your network

In the previous section of this chapter, Security operations excellence, we reviewed the Zero Trust principle. This assumes that breaches are inevitable and therefore we must ensure we have the right controls in place to verify each request. Identity management plays a critical role in this.

There are three principal objectives for securing your network in the Zero Trust model:

  • Preparing to handle attacks in advance
  • Reducing the attack surface and the extent of damage
  • Strengthening your cloud footprint, including resources and configurations that are part of your environment, to reduce the chances of getting compromised

If your organization is enabling remote work and implementing an end-to-end Zero Trust framework, there are some best practices to adhere to in order to achieve these objectives:

  • Network segmentation
  • Threat protection
  • Encryption

Let's take a closer look at each of them.

...