© Marshall Copeland 2017
Marshall CopelandCyber Security on Azurehttps://doi.org/10.1007/978-1-4842-2740-4_5

5. Azure Security Center Scenarios

Assume a Breach
Marshall Copeland
(1)
Ste 202, Castle Rock, Colorado, USA
 
This chapter gives you more details about the cybersecurity configuration recommendations from the example introduced in Chapter 3, the Contoso.com Azure deployment. The recommendations are based on the data provided from a Security Center evaluation of the infrastructure.
Tip
The guiding principle of Microsoft’s security strategy is to “assume a breach.” Microsoft’s global incident response team works around the clock to mitigate the effects of any attack against the Microsoft business cloud. Learn more at https://www.microsoft.com/en-us/TrustCenter/Security/default.aspx ...

Get Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.