Azure Security Cookbook

Book description

Gain critical real-world skills to secure your Microsoft Azure infrastructure against cyber attacks

Purchase of the print or Kindle book includes a free PDF eBook

Key Features

  • Dive into practical recipes for implementing security solutions for Microsoft Azure resources
  • Learn how to implement Microsoft Defender for Cloud and Microsoft Sentinel
  • Work with real-world examples of Azure Platform security capabilities to develop skills quickly

Book Description

With evolving threats, securing your cloud workloads and resources is of utmost importance. Azure Security Cookbook is your comprehensive guide to understanding specific problems related to Azure security and finding the solutions to these problems.

This book starts by introducing you to recipes on securing and protecting Azure Active Directory (AD) identities. After learning how to secure and protect Azure networks, you'll explore ways of securing Azure remote access and securing Azure virtual machines, Azure databases, and Azure storage. As you advance, you'll also discover how to secure and protect Azure environments using the Azure Advisor recommendations engine and utilize the Microsoft Defender for Cloud and Microsoft Sentinel tools. Finally, you'll be able to implement traffic analytics; visualize traffic; and identify cyber threats as well as suspicious and malicious activity.

By the end of this Azure security book, you will have an arsenal of solutions that will help you secure your Azure workload and resources.

What you will learn

  • Find out how to implement Azure security features and tools
  • Understand how to provide actionable insights into security incidents
  • Gain confidence in securing Azure resources and operations
  • Shorten your time to value for applying learned skills in real-world cases
  • Follow best practices and choices based on informed decisions
  • Better prepare for Microsoft certification with a security element

Who this book is for

This book is for Azure security professionals, Azure cloud professionals, Azure architects, and security professionals looking to implement secure cloud services using Microsoft Defender for Cloud and other Azure security features. A solid understanding of fundamental security concepts and prior exposure to the Azure cloud will help you understand the key concepts covered in the book more effectively. This book is also beneficial for those aiming to take Microsoft certification exams with a security element or focus.

Table of contents

  1. Azure Security Cookbook
  2. Contributors
  3. About the author
  4. About the reviewer
  5. Preface
    1. Who is this book for
    2. What this book covers
    3. To get the most out of this book
    4. Conventions used
    5. Get in touch
    6. Share your thoughts
    7. Download a free PDF copy of this book
  6. Part 1: Azure Security Features
  7. Chapter 1: Securing Azure AD Identities
    1. Introduction to Azure Identity Services
      1. What is AD?
    2. Technical requirements
    3. Reviewing Azure AD Identity Secure Score
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    4. Implementing Azure AD tenant Identity and Access Management
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
    5. Implementing Azure AD Password Protection
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    6. Implementing a Self-Service Password Reset
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    7. Implementing Azure AD security defaults
      1. Getting ready
      2. How to do it….
      3. How it works…
      4. See also
    8. Implementing Azure AD multi-factor authentication
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    9. Implementing Conditional Access policies
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    10. Implementing the Azure AD Identity Protection service
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    11. Implementing Azure AD Privileged Identity Management
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  8. Chapter 2: Securing Azure Networks
    1. Technical requirements
    2. Implementing network security groups
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Implementing Azure Firewall
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    4. Implementing Azure Web Application Firewall
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
    5. Implementing Azure DDoS
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
  9. Chapter 3: Securing Remote Access
    1. Technical requirements
    2. Implementing Azure Network Adapter
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
    3. Implementing the Azure Bastion service
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
    4. Implementing JIT VM access
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
  10. Chapter 4: Securing Virtual Machines
    1. Technical requirements
    2. Implementing VM Update Management
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
    3. Implementing VM Microsoft Antimalware
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    4. Implementing VM Azure Disk Encryption
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. There’s more…
      5. See also
  11. Chapter 5: Securing Azure SQL Databases
    1. Technical requirements
    2. Implementing a service-level IP firewall
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Implementing a private endpoint
      1. Getting ready
      2. How to do it…
      3. How it works….
      4. There’s more…
      5. See also
    4. Implementing Azure AD authentication and authorization
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  12. Chapter 6: Securing Azure Storage
    1. Technical requirements
    2. Implementing security settings on storage accounts
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Implementing network security
      1. How to do it…
      2. How it works…
      3. There’s more…
      4. See also
    4. Implementing encryption
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  13. Part 2: Azure Security Tools
  14. Chapter 7: Using Advisor
    1. Technical requirements
    2. Reviewing the security recommendations
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Implementing the security recommendations
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  15. Chapter 8: Using Microsoft Defender for Cloud
    1. Technical requirements
      1. Terminology reference
    2. Review Defender for Cloud components
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Enable enhanced security features of Defender for Cloud
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    4. Add a standard to the Regulatory compliance dashboard
      1. Getting ready
      2. How to do it…
      3. How it works…
    5. Assess your regulatory compliance
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  16. Chapter 9: Using Microsoft Sentinel
    1. Technical requirements
      1. Terminology reference
    2. Enabling Microsoft Sentinel
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    3. Reviewing Microsoft Sentinel components
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    4. Creating automation
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
    5. Set up data connectors
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  17. Chapter 10: Using Traffic Analytics
    1. Technical requirements
      1. Terminology reference
    2. Implementing traffic analytics
      1. Getting ready
      2. How to do it…
      3. How it works…
      4. See also
  18. Index
    1. Why subscribe?
  19. Other Books You May Enjoy
    1. Packt is searching for authors like you
    2. Share your thoughts
    3. Download a free PDF copy of this book

Product information

  • Title: Azure Security Cookbook
  • Author(s): Steve Miles
  • Release date: March 2023
  • Publisher(s): Packt Publishing
  • ISBN: 9781804617960