Muutke küpsiste eelistusi

Microsoft Azure Network Security [Pehme köide]

  • Formaat: Paperback / softback, 208 pages, kõrgus x laius x paksus: 230x186x12 mm, kaal: 380 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 28-Jun-2021
  • Kirjastus: Addison Wesley
  • ISBN-10: 0137252048
  • ISBN-13: 9780137252046
Teised raamatud teemal:
  • Formaat: Paperback / softback, 208 pages, kõrgus x laius x paksus: 230x186x12 mm, kaal: 380 g
  • Sari: IT Best Practices - Microsoft Press
  • Ilmumisaeg: 28-Jun-2021
  • Kirjastus: Addison Wesley
  • ISBN-10: 0137252048
  • ISBN-13: 9780137252046
Teised raamatud teemal:
Following the same approach as Microsoft Press’s widely-praised Microsoft Azure Sentinel and Microsoft Azure Security Center, the authors begin with a thoughtful overview of the network security domain and its importance in the cloud. Next, they present detailed chapters on cloud-native solutions for firewalling, DDOS, WAF, and other services, showing how cloud professionals can successfully deploy them within a best practice architecture. Next, they walk through integrating key third parties, successfully monitoring network security services, and combining all components in a cohesive, “wholistic” network security strategy that can serve as the basis for security and compliance for years to come. No matter how large, small, simple, or complex your Azure environment is, Microsoft Azure Network Security will help you protect what matters most.



Master a complete strategy for protecting any Azure cloud network environment!

 

Network security is crucial to safely deploying and managing Azure cloud resources in any environment. Now, two of Microsoft's leading experts present a comprehensive, cloud-native approach to protecting your network, and safeguarding all your Azure systems and assets. Nicholas DiCola and Anthony Roman begin with a thoughtful overview of network security’s role in the cloud. Next, they offer practical, real-world guidance on deploying cloud-native solutions for firewalling, DDOS, WAF, and other foundational services – all within a best-practice secure network architecture based on proven design patterns.

 

Two of Microsoft's leading Azure network security experts show how to:

  • Review Azure components and services for securing network infrastructure, and the threats to consider in using them
  • Layer cloud security into a Zero Trust approach that helps limit or contain attacks
  • Centrally direct and inspect traffic with the managed, stateful, Platform-as-a-Service Azure Firewall
  • Improve visibility into Azure traffic with Deep Packet Inspection
  • Optimize the way network and web application security work together
  • Use Azure DDoS Protection (Basic and Standard) to mitigate Layer 3 (volumetric) and Layer 4 (protocol) DDoS attacks
  • Enable log collection for Firewall, DDoS, WAF, and Bastion; and configure NSG Flow Logs and Traffic Analytics
  • Continually monitor network security with Azure Sentinel, Security Center, and Network Watcher
  • Customize queries, playbooks, workbooks, and alerts when Azure's robust out-of-the-box alerts and tools aren't enough
  • Build and maintain secure architecture designs that scale smoothly to handle growing complexity

 

About This Book

  • For Security Operations (SecOps) analysts, cybersecurity/information security professionals, network security engineers, and other IT professionals
  • For individuals with security responsibilities in any Azure environment, no matter how large, small, simple, or complex

Acknowledgments x
About the authors xi
Foreword xii
Introduction xiii
Chapter 1 Introduction to Azure Network Security
1(16)
Network connectivity
1(8)
Current threats and challenges
9(3)
Azure Network Security
12(3)
Core security and firewall features
13(2)
Summary
15(2)
Chapter 2 Secure Azure Network architectures
17(18)
Best practices
17(5)
Network architectures
22(11)
Cloud native
23(1)
Hybrid connectivity
24(4)
Hub and spoke
28(1)
Azure Virtual WAN
29(4)
Summary
33(2)
Chapter 3 Controlling traffic with Azure Firewall
35(26)
The role of Azure Firewall in secure architecture
36(9)
Network segmentation for security
36(1)
What is Azure Firewall?
37(1)
Understanding Firewall components
37(1)
Getting traffic to Azure Firewall
38(4)
Integrating with other traffic management
42(3)
Advanced features
45(4)
DNS settings
45(1)
Forced tunneling
46(1)
SNAT Control
47(1)
Traffic inspection
48(1)
Rule types
49(4)
Network rules
49(1)
Application rules
50(1)
DNAT rules
51(2)
Rule processing
53(1)
Azure Firewall Manager
53(7)
Firewall policies
54(3)
Hub virtual networks
57(1)
Secured virtual hubs
58(1)
Third-party security services
59(1)
Summary
60(1)
Chapter 4 Traffic Inspection in Azure Networks
61(18)
Azure Firewall Premium
61(13)
Deploying Azure Firewall Premium
63(1)
TLS inspection
64(4)
Intrusion detection and prevention
68(2)
Using full URLs for traffic management
70(4)
Network Watcher packet capture
74(3)
Summary
77(2)
Chapter 5 Secure application delivery with Azure Web Application Firewall
79(24)
Integrating WAF into app defivepy architecture
80(4)
Load Balancing Options
81(2)
WAF types
83(1)
WAF deployment
84(8)
Before deployment
84(1)
Policy creation
85(6)
Policy management
91(1)
WAF rules and tuning
92(10)
Policy deployment and tuning process
92(1)
OWASP rules
93(4)
Bot management rules
97(1)
Custom rules
98(2)
Exclusions
100(1)
Policy assignment for tuning
101(1)
Summary
102(1)
Chapter 6 Mitigating DDoS attacks
103(20)
How Azure DDoS Protection Works
103(5)
The mitigation pipeline
104(2)
DDoS Protection Basic versus Standard
106(2)
DDoS Protection Options for PaaS Services
108(1)
Enabling Azure DDoS Protection Standard
108(4)
Create a DDoS Protection plan
109(1)
Associate VNets to the DDoS Protection plan
110(1)
Finishing deployment
111(1)
Validation and testing
112(9)
Metrics
112(3)
Validation with BreakingPoint Cloud
115(4)
Log samples
119(1)
Application resiliency
120(1)
Summary
121(2)
Chapter 7 Enabling Network Security log collection
123(18)
Azure Firewall
124(5)
Web Application Firewall
129(3)
Azure DDoS Protection Standard
132(2)
Azure Bastion
134(2)
Network Security Groups
136(3)
Diagnostic settings at scale
139(1)
Summary
140(1)
Chapter 8 Security monitoring with Azure Sentinel, Security Center, and Network Watcher
141(24)
Security Center
141(7)
Security policies
142(2)
Custom policy definitions
144(3)
Azure Defender
147(1)
Azure Sentinel
148(13)
Data connectors for network security
149(1)
Analytic rules and incidents
150(3)
Custom Rules
153(1)
Workbooks
153(3)
Playbooks
156(3)
Hunting
159(2)
Network Watcher
161(2)
Topology
161(1)
IP Flow Verify
162(1)
Summary
163(2)
Chapter 9 Combining Azure resources for a wholistic network security strategy
165(16)
Simple virtual network design
165(2)
Virtual network isolation
166(1)
Network security groups
166(1)
Hub-and-spoke topology
167(3)
VNet peering
167(1)
Routing
168(1)
Hybrid Access
168(1)
Integrating PaaS services
169(1)
Secure administrative access
170(2)
Remote access
171(1)
Role-based access control (RBAC)
171(1)
Application design scenarios
172(4)
Application Gateway behind Front Door
173(2)
Azure Kubernetes application
175(1)
Firewall or WAF?
176(1)
Network Security Monitoring
176(2)
Data collection strategy
176(1)
Cloud secure posture management
177(1)
Summary
178(3)
Index 181
Nicholas DiCola is the principal director of the Cloud Security Customer Experience Engineering (CxE) team. CxE helps customers with deployments of Cloud Security products such as Azure Security Center, Azure Sentinel, Azure Network Security, Azure Information Protection, Microsoft Defender for Identities, and Microsoft Cloud Application Security. CxE is responsible for driving use of Cloud Security products and taking feedback from customers to improve the products. Nicholas has been with Microsoft since 2006 when he started in Microsoft Consulting Services. He has a Master of Business Administration with a concentration in information systems and various industry certifications such as CISSP and CEH. You can follow Nicholas on Twitter at @mastersecjedi.

Anthony Roman is the senior PM manager leading the Azure network security Get-To- Production team within Cloud Security CxE. The team works with customers and network security engineering to ensure that products are fulfilling customer security requirements. Anthony joined Microsoft in 2019 and has held positions in IT and security since he made the transition from bartender to IT security professional a decade earlier. His Bachelor of Arts degree in philosophy is complemented by several industry certifications and plenty of on-the-job and home lab experience. He currently lives in Philadelphia with his wife and two children and can often be seen walking around the city in search of parks and restaurants.