Muutke küpsiste eelistusi

E-raamat: Microsoft Azure Security Center

  • Formaat - PDF+DRM
  • Hind: 31,58 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The definitive practical guide to Azure Security Center, 50%+ rewritten for new features, capabilities, and threats

 

Extensively revised for updates through spring 2021 this guide will help you safeguard cloud and hybrid environments at scale. Two Azure Security Center insiders help you apply Microsoft’s powerful new components and capabilities to improve protection, detection, and response in key operational scenarios. You’ll learn how to secure any workload, respond to new threat vectors, and address issues ranging from policies to risk management.

 

This edition contains new coverage of all Azure Defender plans for cloud workload protection, security posture management with Secure Score, advanced automation, multi-cloud support, integration with Azure Sentinel, APIs, and more. Throughout, you’ll find expert insights, tips, tricks, and optimizations straight from Microsoft’s ASC team. They’ll help you solve cloud security problems far more effectively—and save hours, days, or even weeks.

 

Two of Microsoft’s leading cloud security experts show how to:

• Understand today’s threat landscape, cloud weaponization, cyber kill chains, and the need to “assume breach”

• Integrate Azure Security Center to centralize and improve cloud security, even if you use multiple cloud providers

• Leverage major Azure Policy improvements to deploy, remediate, and protect at scale

• Use Secure Score to prioritize actions for hardening each workload

• Enable Azure Defender plans for different workloads, including Storage, KeyVault, App Service, Kubernetes and more

• Monitor IoT solutions, detect threats, and investigate suspicious activities on IoT devices

• Reduce attack surfaces via just-in-time VM access, file integrity monitoring, and other techniques

• Route Azure Defender alerts to Azure Sentinel or a third-party SIEM for correlation and action

• Access alerts via HTTP, using ASC’s REST API and the Microsoft Graph Security API

• Reliably deploy resources at scale, using JSON-based ARM templates

 

About This Book

• For architects, designers, implementers, operations professionals, developers, and security specialists working in Microsoft Azure cloud or hybrid environments

• For all IT professionals and decisionmakers concerned with the security of Azure environments

Foreword xv
Introduction xvii
Chapter 1 The threat landscape 1(22)
Understanding cybercrime
1(2)
Understanding the cyber kill chain
3(4)
Common threats
5(1)
Building a security posture
5(2)
Adopting an assume breach mentality
7(1)
Cloud threats and security
7(5)
Compliance
9(1)
Risk management
10(1)
Identity and access management
10(1)
Operational security
10(1)
Endpoint protection
11(1)
Data protection
11(1)
Azure Security
12(11)
VM protection
13(1)
Network protection
14(3)
Storage protection
17(2)
Identity
19(1)
Logging
20(1)
Container security
21(2)
Chapter 2 Introduction to Azure Security Center 23(28)
Deployment scenarios
23(1)
Understanding Security Center
24(6)
Security Center architecture
25(4)
Security Center dashboard
29(1)
Planning adoption
30(4)
Roles and permissions
30(1)
Centralized management
31(1)
Storage
31(1)
Recommendations
32(1)
Automation
32(1)
Incorporating Security Center into your security operations
32(2)
Onboarding resources
34(14)
Auto provisioning
37(2)
Onboard virtual machines located on-premises
39(4)
Onboard resources from other cloud providers
43(4)
Onboard resources using PowerShell
47(1)
Inventory
48(3)
Chapter 3 Policy management 51(32)
Introduction to Azure Policy
51(6)
Policy exemptions
54(3)
Security Center policies
57(4)
Fine-tuning Security Center policies
58(3)
Creating custom policies in Azure Security Center
61(3)
Policy enforcement and governance
64(7)
How to overcome reactive security management
66(1)
Prevent security misconfigurations with Security Center
66(2)
Large-scale provisioning with Azure Blueprints
68(3)
Policy deployment and best practices
71(2)
Regulatory standards and compliance
73(10)
Regulatory compliance in Azure Security Center
74(3)
Customize your regulatory compliance experience
77(1)
Build your own compliance initiative
78(5)
Chapter 4 Strengthening your security posture 83(40)
Driving security posture improvement using Secure Score
83(7)
Fine-tuning your Secure Score
86(4)
Create Secure Score automations with APIs and continuous export
90(4)
Get Secure Score data
90(2)
Secure Score over time report
92(1)
Secure Score decrease notification
93(1)
Addressing recommendations
94(24)
Enable multi-factor authentication (MFA)
95(4)
Recommendations and controls focused on compute
99(10)
Networking
109(5)
Data and storage
114(4)
Using workflow automation to remediate security recommendations
118(5)
Resource exemptions and automation
120(3)
Chapter 5 Azure Defender 123(26)
Introduction to Azure Defender
123(1)
Methods of threat detection
124(1)
Understanding alerts
124(8)
Accessing security alerts
126(3)
Alert suppression
129(2)
Alerts in Azure Resource Graph (ARG)
131(1)
Azure Defender for Servers
132(2)
Windows
133(1)
Linux
133(1)
Azure Defender for Containers
134(3)
Azure Kubernetes (AKS)
134(1)
Azure Container Registries (ACR)
135(2)
Azure Defender for App Service
137(1)
Azure Defender for Storage
138(1)
Azure Defender for SQL
139(4)
Vulnerability assessment for SQL
140(3)
Azure Defender for Key Vault
143(1)
Azure Defender for Azure Resource Manager (ARM)
144(1)
Azure Defender for DNS
145(1)
The cyber kill chain and fusion alerts
146(3)
Chapter 6 Azure Defender for IoT 149(12)
Understanding Azure Defender for IoT
149(4)
Configuring Azure Defender for IoT
153(5)
Security recommendations
155(2)
Security alerts
157(1)
Azure Defender for IoT and CyberX
158(3)
Chapter 7 Reducing the attack surface 161(22)
Just-in-time virtual machine access
161(7)
Recommendation to enable JIT
163(2)
JIT dashboard
165(2)
Requesting access
167(1)
File integrity monitoring
168(7)
Customizing your settings
169(4)
Visualizing changes
173(2)
Adaptive Application Control
175(8)
Configuring Adaptive Application Control
177(6)
Chapter 8 SIEM integration 183(12)
Streaming logs to a SIEM solution
183(1)
Azure Sentinel
184(2)
Integration with Azure Sentinel
186(6)
Accessing alerts in Azure Sentinel
189(3)
Integration with other SIEM
192(3)
Chapter 9 Accessing security alerts from API 195(10)
Understanding REST API
195(1)
Accessing alerts using the Security Center REST API
196(4)
Accessing alerts using the Graph Security API
200(5)
Using the Graph Security API
202(3)
Chapter 10 Deploying Azure Security Center at scale 205(10)
The importance of management at scale
205(1)
The three cornerstones
205(4)
Security Center, Azure Policy, and management groups-better together
208(1)
Best practices for managing Security Center at scale
209(1)
How to get started with ARM templates
210(5)
Export templates from Azure portal
210(1)
Use Visual Studio Code to create ARM templates
211(4)
Index 215
Yuri Diogenes, MsC

Yuri has a Master of Science in cybersecurity intelligence and forensics investigation (Utica College) and is the principal program manager for the Microsoft CxE ASC Team, where he primarily helps customers onboard and deploy Azure Security Center and Azure Defender as part of their security operations/incident responses. Yuri has been working in different positions for Microsoft since 2006, including five years as senior support escalation engineer in CSS Forefront Edge Team, and from 2011 to 2017 in the content development team, where he also helped create the Azure Security Center content experience since its GA launch in 2016. Yuri has published a total of 24 books, mostly about information security and Microsoft technologies. Yuri also holds an MBA and many IT/Security industry certifications such as CISSP, E|CND, E|CEH, E|CSA, E|CHFI, CompTIA Security+, CySA+, Cloud Essentials Certified, Mobility+, Network+, CASP, CyberSec First Responder, MCSE, and MCTS. You can follow Yuri on Twitter at @yuridiogenes.

 

Tom Janetscheck

Tom is a senior program manager for Microsofts Azure Security Center CxE Team, where he works with his friend Yuri helping customers onboard and deploy Azure Security Center and Azure Defender. As a former Microsoft MVP, Tom joined the team during COVID-19 in Spring 2020, and he deeply misses in-person conferences because he loves to speak to audiences all over the world. With almost 20 years of experience in various IT admin and consulting roles, Tom has a deep background in IT infrastructure and security, and he holds various certifications, including MCSE and MCTS. When Tom is not writing a book, preparing a conference or user group session, or helping his customers onboard ASC, he is an enthusiastic motorcyclist and musician; he plays guitar, bass, and drums. He also volunteers as a firefighter at the local fire department and can usually be met attending rock concerts all over the place. You can follow Tom on Twitter at @azureandbeyond.