Technical requirementsIntroducing cloud-native securityLaying the foundations for cloud securityThe Azure Security Architecture MapZooming in on data securityUnderstanding encryption mechanisms and capabilitiesPreserving data integrityEnsuring proper data governanceZooming in on identityIntroducing the main solutions used for IDAM and CIAMIntroducing authentication, authorization, and Conditional Access policiesIntroducing common protocols such as OIDC, OAuth 2.0, and SAMLUnderstanding OIDC endpoints and mapping them to Entra IDUnderstanding token types, lifetime, revocation, and Entra ID limitationsGrasping the different authorization flows and token acquisition mechanismsGetting up to speed with token validation and access control mechanismsIntroducing PAM and red tenant architecturesZooming in on CSPMWorking with Azure Policy in practiceExploring Foundational and Defender CSPM plansZooming in on CWPPZooming in on DevSecOpsZooming in on SecOpsZooming in on appliances and CASB solutionsDiving deeper into WAF policiesDiving deeper into Azure FirewallCASB solutions in a nutshellSummaryGet This Book’s PDF Version and Exclusive Extras