Chapter 8 teaches you how to build out next-generation security operations center capabilities with Microsoft Sentinel. This chapter also covers the importance of security orchestration, automation, and response and how to implement it using Sentinel to reduce the time it takes you to respond to suspicious activities and potential signs of compromise to your Azure environment.
In chapter 9, you’ll learn about the different log types available in Azure and how to use them effectively with Azure Monitor. Chapter 10 covers how to ensure the configurations of your Azure resources are compliant and adhere to your organization’s business rules with the help of Azure Policy. In chapter 11, I touch on a hot topic—DevSecOps. Here, I’ll teach you about a new Azure security service called Microsoft Defender for DevOps and how it is applicable to implementing security early on in your software development lifecycle.