As you learned in chapter 6, having good security hygiene by practicing and applying security best practices can help you avoid breaches and keep your Azure resources secured and protected. It’s important to adhere to compliance control frameworks and fix security problems found in recommendations, but there is more to it than that. After security problems have been solved, it’s equally important to monitor your Azure environment for potentially suspicious activities and signs of compromise. With the amount of Azure resources being deployed in your environment increasing both in numbers and resource types, it can be challenging to employ the right security monitoring capabilities for the right resource type. As you can imagine, monitoring virtual machines (VMs) differs from monitoring containerized applications (such as Kubernetes).
Note
To follow along with the exercises in this chapter, you can use the GitHub repository (https://github.com/bmagusic/azure-security).