O'Reilly logo

Cyber Security on Azure: An IT Professional’s Guide to Microsoft Azure Security Center by Marshall Copeland

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

© Marshall Copeland 2017
Marshall CopelandCyber Security on Azurehttps://doi.org/10.1007/978-1-4842-2740-4_5

5. Azure Security Center Scenarios

Assume a Breach
Marshall Copeland
(1)
Ste 202, Castle Rock, Colorado, USA
 
This chapter gives you more details about the cybersecurity configuration recommendations from the example introduced in Chapter 3, the Contoso.com Azure deployment. The recommendations are based on the data provided from a Security Center evaluation of the infrastructure.
Tip
The guiding principle of Microsoft’s security strategy is to “assume a breach.” Microsoft’s global incident response team works around the clock to mitigate the effects of any attack against the Microsoft business cloud. Learn more at https://www.microsoft.com/en-us/TrustCenter/Security/default.aspx ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required