4 Securing compute resources in Azure: Azure Bastion, Kubernetes, Azure App Service
- Azure Bastion
- Securing Kubernetes clusters
- What makes containers security different
- Securing Azure App Service
4.1 Azure Bastion
4.1.1 Basic vs Standard SKU
4.1.2 Azure Bastion in action
4.1.3 Connecting to Azure Bastion using your browser and Azure portal
4.1.4 Connecting to Azure Bastion using the native RDP or SSH client
4.2 Securing Kubernetes clusters
4.2.1 What are containers?
4.2.2 What is a container registry?
4.2.3 What is Kubernetes?
4.2.4 How does Kubernetes work?
4.2.5 Managed vs unmanaged Kubernetes
4.3 What makes container security different?
4.3.1 Typical challenges when securing Kubernetes clusters
4.3.2 Securing Azure Kubernetes Service and Azure Container Registry
4.3.3 Security monitoring for Azure Kubernetes Service and Azure Container Registry
4.4 Securing Azure App Service
4.4.1 Authentication and authorization
4.4.2 Access restrictions
4.4.3 Subdomain takeover
4.4.4 OS and application-stack patching
4.5 Answers to exercises
4.5.1 Exercise 4.1
4.5.2 Exercise 4.2
4.5.3 Exercise 4.3
4.6 Summary