2
Securing Azure Networks
In the previous chapter, we covered recipes that provided the foundation for securing Azure AD identities.
We should consider Zero Trust and defense in depth to be cornerstones of a cloud security strategy. We must consider the network as untrusted and assume a breach.
In this chapter, we build on those foundations and go through recipes that will equip us with the skills for securing Azure networks.
We will take a look at the protection of the network from the Open Systems Interconnection (OSI) model perspective and focus on solutions to protect Layer 3 (Network), Layer 4 (Transport), and Layer 7 (Application).
By the end of this chapter, you will have gained valuable skills for securing Azure networks through the ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access