O'Reilly logo

Microsoft Azure Security Infrastructure by Debra Shinder, Tom Shinder, Yuri Diogenes

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Operations and management in the cloud

After you correctly configure all your resources to use the Microsoft Azure security capabilities, you should ensure that your operations are also employing security considerations in all management phases. Throughout this book, you learned how Azure can help protect your cloud resources by using built-in capabilities. This chapter provides a scenario in which the target company needs to design its cloud infrastructure, taking into consideration connectivity with on-premises resources, virtual machine (VM) protection, and secure operations.

This chapter explains how to combine the capabilities that were described throughout this book to accomplish this fictitious organization’s goals.

Scenario ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required