Introduction |
|
xix | |
Assessment Test |
|
xxv | |
|
Chapter 1 Introduction to Microsoft Azure |
|
|
1 | (28) |
|
|
3 | (1) |
|
Cloud Environment Security Objectives |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
Principle of Least Privilege |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (3) |
|
Avoid Security through Obscurity |
|
|
9 | (1) |
|
The AAAs of Access Management |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
11 | (1) |
|
|
11 | (1) |
|
Asymmetric Key Encryption |
|
|
11 | (2) |
|
|
13 | (1) |
|
Basic Network Configuration |
|
|
13 | (1) |
|
Unsegmented Network Example |
|
|
14 | (1) |
|
Internal and External Compliance |
|
|
15 | (1) |
|
Cybersecurity Considerations for the Cloud Environment |
|
|
16 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (1) |
|
Major Cybersecurity Threats |
|
|
19 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (3) |
|
|
24 | (1) |
|
|
24 | (2) |
|
|
26 | (3) |
|
Chapter 2 Managing Identity and Access in Microsoft Azure |
|
|
29 | (44) |
|
Identity and Access Management |
|
|
31 | (1) |
|
Identifying Individuals in a System |
|
|
31 | (1) |
|
Identifying and Assigning Roles in a System and to an Individual |
|
|
32 | (1) |
|
Assigning Access Levels to Individuals or Groups |
|
|
33 | (1) |
|
Adding, Removing, and Updating Individuals and Their Roles in a System |
|
|
33 | (1) |
|
Protecting a System's Sensitive Data and Securing the System |
|
|
33 | (1) |
|
|
34 | (1) |
|
IAM in the Microsoft Azure Platform |
|
|
34 | (1) |
|
Creating and Managing Azure AD Identities |
|
|
34 | (3) |
|
|
37 | (2) |
|
|
39 | (1) |
|
Adding Users to Your Azure AD |
|
|
39 | (1) |
|
Managing External Identities Using Azure AD |
|
|
40 | (2) |
|
Managing Secure Access Using Azure Active Directory |
|
|
42 | (2) |
|
Implementing Conditional Access Policies, Including MFA |
|
|
44 | (1) |
|
Implementing Azure AD Identity Protection |
|
|
45 | (2) |
|
|
47 | (3) |
|
Implement Passwordless Authentication |
|
|
50 | (2) |
|
Configuring an Access Review |
|
|
52 | (5) |
|
Managing Application Access |
|
|
57 | (1) |
|
Integrating Single Sign-On and Identity Providers for Authentication |
|
|
57 | (1) |
|
Creating an App Registration |
|
|
58 | (1) |
|
Configuring App Registration Permission Scopes |
|
|
58 | (1) |
|
Managing App Registration Permission Consent |
|
|
59 | (1) |
|
Managing API Permission to Azure Subscriptions |
|
|
60 | (1) |
|
Configuring an Authentication Method for a Service Principal |
|
|
61 | (1) |
|
|
62 | (1) |
|
Interpret Role and Resource Permissions |
|
|
62 | (1) |
|
Configuring Azure Role Permissions for Management Groups, Subscriptions, Resource Groups, and Resources |
|
|
63 | (1) |
|
Assigning Built-In Azure AD Roles |
|
|
64 | (1) |
|
Creating and Assigning Custom Roles, Including Azure Roles and Azure AD Roles |
|
|
65 | (1) |
|
|
66 | (1) |
|
|
67 | (3) |
|
|
70 | (3) |
|
Chapter 3 Implementing Platform Protections |
|
|
73 | (52) |
|
Implementing Advanced Network Security |
|
|
75 | (1) |
|
Securing Connectivity of Hybrid Networks |
|
|
75 | (2) |
|
Securing Connectivity of Virtual Networks |
|
|
77 | (1) |
|
Creating and Configuring Azure Firewalls |
|
|
78 | (1) |
|
|
79 | (3) |
|
Creating and Configuring Azure Firewall Manager |
|
|
82 | (1) |
|
Creating and Configuring Azure Application Gateway |
|
|
82 | (5) |
|
Creating and Configuring Azure Front Door |
|
|
87 | (4) |
|
Creating and Configuring a Web Application Firewall |
|
|
91 | (2) |
|
Configuring Network Isolation for Web Apps and Azure Functions |
|
|
93 | (1) |
|
Implementing Azure Service Endpoints |
|
|
94 | (3) |
|
Implementing Azure Private Endpoints, Including Integrating with Other Services |
|
|
97 | (1) |
|
Implementing Azure Private Link |
|
|
98 | (3) |
|
Implementing Azure DDoS Protection |
|
|
101 | (1) |
|
Configuring Enhanced Security for Compute |
|
|
102 | (1) |
|
Configuring Azure Endpoint Protection for VMs |
|
|
102 | (2) |
|
Enabling Update Management in Azure Portal |
|
|
104 | (4) |
|
Configuring Security for Container Services |
|
|
108 | (1) |
|
Managing Access to the Azure Container Registry |
|
|
109 | (1) |
|
Configuring Security for Serverless Compute |
|
|
109 | (2) |
|
Microsoft Recommendations |
|
|
111 | (1) |
|
Configuring Security for an Azure App Service |
|
|
112 | (6) |
|
|
118 | (4) |
|
|
122 | (3) |
|
Chapter 4 Managing Security Operations |
|
|
125 | (58) |
|
Configure Centralized Policy Management |
|
|
126 | (1) |
|
Configure a Custom Security Policy |
|
|
126 | (1) |
|
Create Custom Security Policies |
|
|
127 | (1) |
|
Creating a Policy Initiative |
|
|
128 | (1) |
|
Configuring Security Settings and Auditing by Using Azure Policy |
|
|
129 | (1) |
|
Configuring and Managing Threat Protection |
|
|
130 | (1) |
|
Configuring Microsoft Defender for Cloud for Servers (Not Including Microsoft Defender for Endpoint) |
|
|
131 | (3) |
|
Configuring Microsoft Defender for SQL |
|
|
134 | (5) |
|
Using the Microsoft Threat Modeling Tool |
|
|
139 | (8) |
|
|
147 | (1) |
|
Visualizations in Azure Monitor |
|
|
148 | (1) |
|
Configuring and Managing Security Monitoring Solutions |
|
|
149 | (1) |
|
Creating and Customizing Alert Rules by Using Azure Monitor |
|
|
149 | (8) |
|
Configuring Diagnostic Logging and Retention Using Azure Monitor |
|
|
157 | (2) |
|
Monitoring Security Logs Using Azure Monitor |
|
|
159 | (8) |
|
|
167 | (3) |
|
Configuring Connectors in Microsoft Sentinel |
|
|
170 | (5) |
|
Evaluating Alerts and Incidents in Microsoft Sentinel |
|
|
175 | (1) |
|
|
176 | (1) |
|
|
177 | (2) |
|
|
179 | (4) |
|
Chapter 5 Securing Data and Applications |
|
|
183 | (78) |
|
Configuring Security for Storage in Azure |
|
|
184 | (1) |
|
Storage Account Access Keys |
|
|
185 | (1) |
|
Configuring Access Control for Storage Accounts |
|
|
185 | (4) |
|
Configuring Storage Account Access Keys |
|
|
189 | (2) |
|
Configuring Azure AD Authentication for Azure Storage and Azure Files |
|
|
191 | (11) |
|
Configuring Delegated Access for Storage Accounts |
|
|
202 | (18) |
|
Configuring Security for Databases |
|
|
220 | (34) |
|
|
254 | (1) |
|
|
255 | (2) |
|
|
257 | (4) |
|
Appendix A An Azure Security Tools Overview |
|
|
261 | (40) |
|
Chapter 2, "Managing Identity and Access on Microsoft Azure" |
|
|
262 | (1) |
|
Azure Active Directory (AD) |
|
|
262 | (3) |
|
Microsoft Authenticator App |
|
|
265 | (1) |
|
|
265 | (1) |
|
Chapter 3, "Implementing Platform Protections" |
|
|
266 | (1) |
|
|
266 | (1) |
|
|
267 | (2) |
|
Azure Application Gateway |
|
|
269 | (4) |
|
|
273 | (1) |
|
|
273 | (1) |
|
|
274 | (1) |
|
|
274 | (1) |
|
|
275 | (1) |
|
Microsoft Defender for Cloud |
|
|
276 | (1) |
|
|
277 | (1) |
|
|
278 | (1) |
|
Chapter 4, "Managing Security Operations" |
|
|
279 | (1) |
|
|
279 | (2) |
|
Microsoft Threat Modeling Tool |
|
|
281 | (6) |
|
|
287 | (2) |
|
How Does Microsoft Sentinel Work? |
|
|
289 | (1) |
|
|
290 | (1) |
|
Chapter 5, "Securing Data and Applications" |
|
|
290 | (9) |
|
|
299 | (2) |
|
Appendix B Answers to Review Questions |
|
|
301 | (8) |
|
Chapter 1 Introduction to Microsoft Azure |
|
|
302 | (1) |
|
Chapter 2 Managing Identity and Access in Microsoft Azure |
|
|
303 | (1) |
|
Chapter 3 Implementing Platform Protections |
|
|
304 | (1) |
|
Chapter 4 Managing Security Operations |
|
|
305 | (1) |
|
Chapter 5 Securing Data and Applications |
|
|
306 | (3) |
Index |
|
309 | |