Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By : Jochen Nickel
Book Image

Mastering Identity and Access Management with Microsoft Azure - Second Edition

By: Jochen Nickel

Overview of this book

Microsoft Azure and its Identity and access management are at the heart of Microsoft's software as service products, including Office 365, Dynamics CRM, and Enterprise Mobility Management. It is crucial to master Microsoft Azure in order to be able to work with the Microsoft Cloud effectively. You’ll begin by identifying the benefits of Microsoft Azure in the field of identity and access management. Working through the functionality of identity and access management as a service, you will get a full overview of the Microsoft strategy. Understanding identity synchronization will help you to provide a well-managed identity. Project scenarios and examples will enable you to understand, troubleshoot, and develop on essential authentication protocols and publishing scenarios. Finally, you will acquire a thorough understanding of Microsoft Information protection technologies.
Table of Contents (23 chapters)
Title Page
Copyright and Credits
About Packt
Contributors
Preface
Index

General overview of data classification


After we describe the necessity and the four central elements of the security culture, we will discuss the data classification to create the basis for a successful solution in the area of information protection. As already mentioned, data classification provides the necessary information and tools for the correct use of protective measures. Let's start with a basic definition of data classification. It is a continuous process of consistently categorizing information based on specific and predefined criteria so that the data can be efficiently verified, effectively identified, and protected. This is why data classification is the foundation of data security.

Successful data classification requires a broad awareness of the needs of an organization and a thorough understanding of where the data assets are located and how data or information is generated. For this reason, finding and identifying existing data on various endpoints, such as network shares...