Book Image

The Azure Cloud Native Architecture Mapbook

By : Stéphane Eyskens, Ed Price
Book Image

The Azure Cloud Native Architecture Mapbook

By: Stéphane Eyskens, Ed Price

Overview of this book

Azure offers a wide range of services that enable a million ways to architect your solutions. Complete with original maps and expert analysis, this book will help you to explore Azure and choose the best solutions for your unique requirements. Starting with the key aspects of architecture, this book shows you how to map different architectural perspectives and covers a variety of use cases for each architectural discipline. You'll get acquainted with the basic cloud vocabulary and learn which strategic aspects to consider for a successful cloud journey. As you advance through the chapters, you'll understand technical considerations from the perspective of a solutions architect. You'll then explore infrastructure aspects, such as network, disaster recovery, and high availability, and leverage Infrastructure as Code (IaC) through ARM templates, Bicep, and Terraform. The book also guides you through cloud design patterns, distributed architecture, and ecosystem solutions, such as Dapr, from an application architect's perspective. You'll work with both traditional (ETL and OLAP) and modern data practices (big data and advanced analytics) in the cloud and finally get to grips with cloud native security. By the end of this book, you'll have picked up best practices and more rounded knowledge of the different architectural perspectives.
Table of Contents (13 chapters)
1
Section 1: Solution and Infrastructure
6
Section 2: Application Development, Data, and Security
10
Section 3: Summary

Adding the security bits to our Contoso use case

In this section, we will review our Contoso use case that we started in Chapter 2, Solution Architecture, and improved in Chapter 5, Application Architecture. However, none of our diagrams included security-specific portions. It is time to fix this and see where to use some of the features that we have explained throughout this chapter. Figure 7.20 illustrates what we ended up with in Chapter 5, Application Architecture:

Figure 7.20 – Reminder of the Contoso use case from Chapter 5

Figure 7.20 – Reminder of the Contoso use case from Chapter 5

As you can see, there is nothing specific about security. For the sake of simplicity and brevity, we will get rid of the Power BI and Stream Analytics services. So, our new functional flow is now as shown in Figure 7.21:

Figure 7.21 – Revisited flow without Stream Analytics and Power BI

Figure 7.21 – Revisited flow without Stream Analytics and Power BI

For the security bits, we are interested in the interactions between the components, to understand...