Part 2. Securing Azure resources

 

Now that you know how to secure the identities used to access your Azure resources, you’re ready to proceed to the next part of the journey that you’re on with respect to Azure security. This part teaches you how to secure commonly used resource types in Azure.

Chapter 3 is all about network security in Azure. It teaches you how to implement a secure network infrastructure in Azure using a set of services commonly referred to as Azure network security. In chapter 4, you learn how to secure compute resources, which are widely used to run applications in Azure, such as VMs, Azure Kubernetes Services, and Azure App Service.

Chapter 5 covers securing data resources in Azure, such as storage accounts and Azure Key Vault, which are commonly used to store data, secrets, and certificates. In chapter 6, I teach you how to use Microsoft Defender for Cloud to continuously assess the configuration of your Azure resources and apply security best practice guidance.

Chapter 7 picks up where the previous chapter left off and teaches you how to enable and apply threat detection capabilities with Defender for Cloud to detect suspicious activities and potential signs of compromise of your Azure environment.

When you’re finished with this part of the book, you’ll be ready to embark on the next part the journey you’re on with respect to Azure security.