Azure security:
Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Shelter Island, NY
Manning Publications
2024
|
Schlagworte: | |
Online-Zugang: | https://learning.oreilly.com/library/view/~/9781633438811/?ar Inhaltsverzeichnis |
Zusammenfassung: | Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you'll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the Technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the Book Azure Security details best practices for configuring and deploying Azure's native security services--from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 336 Seiten Illustrationen, Diagramme |
ISBN: | 9781633438811 1633438813 9781638354338 1638354332 |
Internformat
MARC
LEADER | 00000nam a22000001c 4500 | ||
---|---|---|---|
001 | BV049723998 | ||
003 | DE-604 | ||
005 | 20240628 | ||
007 | t | ||
008 | 240531s2024 a||| |||| 00||| eng d | ||
020 | |a 9781633438811 |9 978-1-63343-881-1 | ||
020 | |a 1633438813 |9 1-63343-881-3 | ||
020 | |a 9781638354338 |9 978-1-63835-433-8 | ||
020 | |a 1638354332 |9 1-63835-433-2 | ||
035 | |a (OCoLC)1443578129 | ||
035 | |a (DE-599)BVBBV049723998 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Magušić, Bojan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Azure security |c Bojan Magusic |
264 | 1 | |a Shelter Island, NY |b Manning Publications |c 2024 | |
264 | 2 | |a Sebastopol, CA |b O'Reilly Media Inc. | |
300 | |a 336 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 3 | |a Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. | |
520 | 3 | |a In Azure Security you'll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the Technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. | |
520 | 3 | |a The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the Book Azure Security details best practices for configuring and deploying Azure's native security services--from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. | |
650 | 0 | 7 | |a Cloud Computing |0 (DE-588)7623494-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Windows Azure |0 (DE-588)7693533-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Windows Azure |0 (DE-588)7693533-4 |D s |
689 | 0 | 1 | |a Cloud Computing |0 (DE-588)7623494-0 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-63835-433-8 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 1-63835-433-2 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781633438811/?ar |x Verlag |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035066318&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035066318 |
Datensatz im Suchindex
_version_ | 1815416456389591040 |
---|---|
adam_text |
brief contents Part 1 First steps. 1 1 ■ About Azure security 3 2 ■ Securing identities in Azure: The four pillars of identity and Azure Active Directory 21 Part 2 Securing Azure resources. .57 3 ■ Implementing network security in Azure: Firewall, WAF, and DDoS protection 59 4 ■ Securing compute resources in Azure: Azure Bastion, Kubernetes, and Azure App Service 91 5 ■ Securing data in Azure Storage accounts: Azure Key Vault 121 6 ■ Implementing good security hygiene: Microsoft Defender for Cloud and Defender CSPM 150 7 ■ Security monitoring for Azure resources: Microsoft Defender for Cloud plans 176 Part 3 Going further. 209 8 ■ Security operations and response: Microsoft Sentinel 9 ■ Audit and log data: Azure Monitor 237 10 ■ Importance of governance: Azure Policy and Azure Blueprints 260 11 ■ DevSecOps: Microsoft Defender for DevOps 277 vi 211
contents preface xiii acknowledgments xiv about this book xvii about the author xxi about the cover illustration About Azure security xxii 3 1.1 Cybersecurity as an infinite game 1.2 Shared responsibility model 1.3 Azure security services 1.4 The threat landscape 1.5 Cloud security challenges 1.6 Digital medievalism 1.7 The zero trust security model 1.8 Defense in depth 4 6 7 8 10 12 12 13 Securing identities 15 ■ Securing infrastructure and networking resources 16 · Securing applications and data 18 Heroes and villains in this book 19
viii CONTENTS ^ Securing identities in Azure: Thefour pillars of identity and Azure Active Directory 21 2.1 Four pillars of identity 22 What is Azure Active Director)1 ? 23· What is an identity? 24 Azure AD user identities in action 24 · Azure AD service principals in action 26 · Managed identity in Azure AD 27 Managed identity in action 27 2.2 Authentication 29 Azure AD as an IAM service 31 ■ Importance of multifactor authentication 31 ■ Azure MFA 31 ■ Security defaults in Azure AD 32 ■ Identity protection 34 · Identity protection inaction 35· Conditional access in Azure AD 37 Conditional access in action 38 2.3 Authorization 40 Azure role-based access control 41 · How does Azure RBAC work? 41 ■ Role assignment 44 ■ Azure role-based access control in action 45 2.4 Custom roles 2.5 Custom roles in action 2.6 Identity governance 46 46 48 Privileged identity management Access reviews 52 2.7 Part 2 Answers to exercises 49 · PIM in action 49 54 Securing Azure resources . 000000 ^ Implementing network security in Azure: Firewall, WAF, and DDoS protection 59 3.1 Azure network security 60 The importance of network segmentation model 62 3.2 Azure Firewall 60 ■ Positive security 62 Azure Firewall Standard vs. Premium 63 ■ Azure Firewall Standard in action 63 ■ Creating an Azure Firewall instance 64 ■ Routing traffic to Azure Firewall 65 Routing to direct traffic 66 · Associating a route table to a subnet 67 ■ Allowing Azure Firewall traffic 68 ■ Azure Firewall Premium 72 ■ Azure Firewall policy 73 ■ Azure Firewall Manager 73 57
ix CONTENTS 3.3 Azure Web Application Firewall 75 Azure WAF on Azure Application Gateway in action 75 Azure WAF on Azure Front Door in action 80 ■ Tuning Azure WAF 85 3.4 Mitigating DDoS attacks DDoS Protection in Azure Protection plan 88 3.5 Answers to exercises 86 86 ■ Creating an Azure DDoS 90 Securing compute resources in Azure: Azure Bastion, Kubemetes, and Azure App Service 91 4.1 Azure compute resources 4.2 Azure Bastion 91 93 Basic vs. Standard SKU 94 ■ Azure Bastion in action 94 Connecting to Azure Bastion using your browser and Azure portal 98 ■ Connecting to Azure Bastion using the native RDP or SSH client 101 4.3 Securing Kubemetes clusters 104 What are containers? 104· What is a container registry? 105 What is Kubemetes? 106 · How does Kubemetes work? 106 Managed vs. unmanaged Kubemetes 108 4.4 What makes container security different? 109 Typical challenges when securing Kubemetes clusters 110 Securing Azure Kubemetes Service and Azure Container Registry 111 · Security monitoringfor Azure Kubemetes Service and Azure Container Registry 111 4.5 Securing Azure App Service 112 Authentication and authorization 113 · Access restrictions Subdomain takeover 117 · OS and application-stack patching 118 4.6 Answers to exercises 113 119 Securing data in Azure Storage accounts: Azure Key Vault 5.1 Securing storage accounts 122 Azure Storage firewall 123 ■ Authorizing control plane operations 126 · Authorizing data plane operations 127 SSE 131 ■ Encryption key management 132 ■ Encryption using a customer-managed key 132 ■ Encryption using a customer-managed key in action 134
■ Encryption scopes 139 Infrastructure encryption 141 121
X CONTENTS 5.2 Securing Azure Key Vault 142 Authorizing control plane operations 142 · Authorizing data plane operations 143 · Azure Key Vault firewall 145 Implementing good security hygiene: Microsoft Defenderfor Cloud and Defender CSPM 150 6.1 Microsoft Defender for Cloud 6.2 Cloud security posture management 151 152 Onboarding your subscriptions to Defenderfor Cloud 153 Recommendations 157 · Secure score 158 ■ Free vs. paid security posture management capabilities in Microsoft Defenderfor Cloud 163 6.3 Cloud security graph 163 Attack paths 164 ■ Cloud security explorer scanningfor machines 168 6.4 Security governance 165 ■ Agentless 168 Manually assigning owners and due dates 169 ■ When should you use a grace period? 170· Programmatically assigning owners and due dates 170 6.5 Regulatory compliance 171 Regulatory compliance in action standard 173 6.6 Answers to exercises 172 ■ Adding a built-in 174 Security monitoringfor Azure resources: Microsoft Defenderfor Cloud plans 176 7.1 Cloud workload protection 7.2 Microsoft Defender for Cloud plans 177 177 Microsoft Defenderfor Servers 178 · Microsoft Defenderfor Containers 182 · Microsoft Defenderfor App Service 186 Microsoft Defenderfor Storage 187 · Microsoft Defenderfor Databases 188 ■ Microsoft Defenderfor Key Vault 190 Microsoft Defenderfor Resource Manager 191 ■ Microsoft Defenderfor DNS 192 · Email notifications 193 7.3 Security alerts 195 Security alerts in action 7.4 Workflow automation 196 · Investigating security alerts 199 Workflow automation in action 200 198
xi CONTENTS 7.5 Exporting data 202 202 ■ Continuous export in action Continuous export 7.6 Workbooks 205 205 · Workbooks in action Using workbooks 7.7 203 Answers to exercises 207 207 Part 3 Security operations and response: Microsoft Sentinel 211 8.1 Security Information and Event Management 8.2 Microsoft Sentinel 212 Microsoft Sentinel capabilities Sentinel 214 8.3 Data collection 212 213 · Enabling Microsoft 214 215 What data should go in a SIEM? 215 ■ Data connectors Data connectors in action 216· Content hub 219 8.4 Analytics rules 220 Microsoft security rules 221 ■ Microsoft security rules in action Scheduled rules 223 ■ Scheduled rules in action 223 227 8.5 Incidents 8.6 User and entity behavior analytics When to use UEBA in action 230 229 230 ■ User and entity behavior analytics 8.7 Security orchestration, automation, and response 8.8 Automation rules 232 Automation elements and trigger events rules in action 232 8.9 Answers to Exercises 232 ■ Automation 234 Audit and log data: Azure Monitor 23 7 9.1 Understanding different log types in Azure 238 Azure tenant logs 239 · Azure subscriptions 244 Azure resources 246 ■ Operating system 247 9.2 Azure Monitor 9.3 Diagnostic settings 231 249 250 Diagnostic settings in action 250 221
xü CONTENTS 9.4 Data collection rules 251 Data collection rules in action 9.5 Alert rules 256 Types of alerts 9.6 253 256 ■ Alert rules in action Answers to exercises 256 258 J ^ Importance ofgovernance: Azure Policy and Azure Blueprints 260 10.1 What is Azure Policy? 10.2 Getting started with Azure Policy Azure Policy in action 261 262 262 ■ Scope 264 ■ Policy effects 10.3 Custom policies 10.4 Centralized security policy management 10.5 Azure Blueprints 10.6 Answers to exercises 270 272 274 275 J J DevSecOps: Microsoft Defenderfor DevOps 11.1 Developing code more securely 11.2 What is shifting security left? 11.3 Infrastructure as code 277 278 279 279 Infrastructure as code in action vulnerabilities in code? 286 11.4 268 281 ■ Who is responsiblefarfixing Microsoft Defender for DevOps 287 UnifiedDevOpsposture visibility 289 ■ Microsoft Security DevOps application 292 · GitHub Advanced Security 293 Microsoft Security DevOps for GitHub in action 293 laC scanning in GitHub 294 ■ Microsoft Security DevOps for Azure DevOps in action 295 ■ laC scanning in ADO 297 Secrets scanning 297 ■ Code-to-cloud contextualization 298 11.5 Cybersecurity as an infinite game 11.6 Answers to exercises appendix 300 Setting up Azure CLI on your machine index 305 298 301 |
any_adam_object | 1 |
author | Magušić, Bojan |
author_facet | Magušić, Bojan |
author_role | aut |
author_sort | Magušić, Bojan |
author_variant | b m bm |
building | Verbundindex |
bvnumber | BV049723998 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1443578129 (DE-599)BVBBV049723998 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000001c 4500</leader><controlfield tag="001">BV049723998</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240628</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">240531s2024 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781633438811</subfield><subfield code="9">978-1-63343-881-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1633438813</subfield><subfield code="9">1-63343-881-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781638354338</subfield><subfield code="9">978-1-63835-433-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1638354332</subfield><subfield code="9">1-63835-433-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1443578129</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049723998</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Magušić, Bojan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Azure security</subfield><subfield code="c">Bojan Magusic</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Shelter Island, NY</subfield><subfield code="b">Manning Publications</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">Sebastopol, CA</subfield><subfield code="b">O'Reilly Media Inc.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">336 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">In Azure Security you'll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the Technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the Book Azure Security details best practices for configuring and deploying Azure's native security services--from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team.</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Windows Azure</subfield><subfield code="0">(DE-588)7693533-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Windows Azure</subfield><subfield code="0">(DE-588)7693533-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Cloud Computing</subfield><subfield code="0">(DE-588)7623494-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-63835-433-8</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">1-63835-433-2</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://learning.oreilly.com/library/view/~/9781633438811/?ar</subfield><subfield code="x">Verlag</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035066318&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035066318</subfield></datafield></record></collection> |
id | DE-604.BV049723998 |
illustrated | Illustrated |
indexdate | 2024-11-11T09:07:26Z |
institution | BVB |
isbn | 9781633438811 1633438813 9781638354338 1638354332 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035066318 |
oclc_num | 1443578129 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | 336 Seiten Illustrationen, Diagramme |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Manning Publications |
record_format | marc |
spelling | Magušić, Bojan Verfasser aut Azure security Bojan Magusic Shelter Island, NY Manning Publications 2024 Sebastopol, CA O'Reilly Media Inc. 336 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Secure your Azure applications the right way. The expert DevSecOps techniques you'll learn in this essential handbook make it easy to keep your data safe. As a Program Manager at Microsoft, Bojan Magusic has helped numerous Fortune 500 companies improve their security posture in Azure. Now, in Azure Security he brings his experience from the cyber security frontline to ensure your Azure cloud-based systems are safe and secure. In Azure Security you'll learn vital security skills, including how to: Set up secure access through Conditional Access policiesImplement Azure WAF on Application Gateway and Front Door Deploy Azure Firewall Premium for monitoring network activities Enable Microsoft Defender for Cloud to assess workload configurations Utilize Microsoft Sentinel for threat detection and analytics Establish Azure Policy for compliance with business rules Correctly set up out-of-the-box Azure services to protect your web apps against both common and sophisticated threats, learn to continuously assess your systems for vulnerabilities, and discover cutting-edge operations for security hygiene, monitoring, and DevSecOps. Each stage is made clear and easy to follow with step-by-step instructions, complemented by helpful screenshots and diagrams. About the Technology Securing cloud-hosted applications requires a mix of tools, techniques, and platform-specific services. The Azure platform provides built-in security tools to keep your systems safe, but proper implementation requires a foundational strategy and tactical guidance. About the Book Azure Security details best practices for configuring and deploying Azure's native security services--from a zero-trust foundation to defense in depth (DiD). Learn from a Microsoft security insider how to establish a DevSecOps program using Microsoft Defender for Cloud. Realistic scenarios and hands-on examples help demystify tricky security concepts, while clever exercises help reinforce what you've learned. What's Inside Set up secure access policies Implement a Web Application Firewall Deploy MS Sentinel for monitoring and threat detection Establish compliance with business rules About the Reader For software and security engineers building and securing Azure applications. About the Author Bojan Magusic is a Product Manager with Microsoft on the Security Customer Experience Engineering Team. Cloud Computing (DE-588)7623494-0 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Windows Azure (DE-588)7693533-4 gnd rswk-swf Windows Azure (DE-588)7693533-4 s Cloud Computing (DE-588)7623494-0 s Computersicherheit (DE-588)4274324-2 s DE-604 Erscheint auch als Online-Ausgabe 978-1-63835-433-8 Erscheint auch als Online-Ausgabe 1-63835-433-2 https://learning.oreilly.com/library/view/~/9781633438811/?ar Verlag Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035066318&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Magušić, Bojan Azure security Cloud Computing (DE-588)7623494-0 gnd Computersicherheit (DE-588)4274324-2 gnd Windows Azure (DE-588)7693533-4 gnd |
subject_GND | (DE-588)7623494-0 (DE-588)4274324-2 (DE-588)7693533-4 |
title | Azure security |
title_auth | Azure security |
title_exact_search | Azure security |
title_full | Azure security Bojan Magusic |
title_fullStr | Azure security Bojan Magusic |
title_full_unstemmed | Azure security Bojan Magusic |
title_short | Azure security |
title_sort | azure security |
topic | Cloud Computing (DE-588)7623494-0 gnd Computersicherheit (DE-588)4274324-2 gnd Windows Azure (DE-588)7693533-4 gnd |
topic_facet | Cloud Computing Computersicherheit Windows Azure |
url | https://learning.oreilly.com/library/view/~/9781633438811/?ar http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=035066318&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT magusicbojan azuresecurity |