Book Image

Mastering Azure Security - Second Edition

By : Mustafa Toroman, Tom Janetscheck
Book Image

Mastering Azure Security - Second Edition

By: Mustafa Toroman, Tom Janetscheck

Overview of this book

Security is integrated into every cloud, but this makes users put their guard down as they take cloud security for granted. Although the cloud provides higher security, keeping their resources secure is one of the biggest challenges many organizations face as threats are constantly evolving. Microsoft Azure offers a shared responsibility model that can address any challenge with the right approach. Revised to cover product updates up to early 2022, this book will help you explore a variety of services and features from Microsoft Azure that can help you overcome challenges in cloud security. You'll start by learning the most important security concepts in Azure, their implementation, and then advance to understanding how to keep resources secure. The book will guide you through the tools available for monitoring Azure security and enforcing security and governance the right way. You'll also explore tools to detect threats before they can do any real damage and those that use machine learning and AI to analyze your security logs and detect anomalies. By the end of this cloud security book, you'll have understood cybersecurity in the cloud and be able to design secure solutions in Microsoft Azure.
Table of Contents (15 chapters)
1
Section 1: Identity and Governance
5
Section 2: Cloud Infrastructure Security
9
Section 3: Security Management

Questions

As we conclude, here is a list of questions for you to test your knowledge regarding this chapter's material. You will find the answers in the Assessments section of the Appendix:

  1. What are Log Analytics' best practices?

A. Use a single workspace.

B. Use regional workspaces.

C. Use multiple workspaces for each region and each service.

D. Based on requirements, both A and B can be correct.

  1. We can control network access to Azure SQL Database with…

A. An access list

B. A firewall

C. Conditional access

  1. Which type of certificate is supported in Azure App Service?

A. Private

B. Public

C. Wildcard

D. All of the above

E. Only 1 and 2

F. Only 2 and 3

  1. We can control network access to Azure App Service with…

A. Access restrictions

B. A firewall

C. Conditional access

  1. What is a best practice for enabling App Service communication with other Azure services?
  2. ...