Foreword |
|
vi | |
Introduction |
|
ix | |
Chapter 1 Cloud security |
|
1 | (18) |
|
Cloud security considerations |
|
|
1 | (5) |
|
|
1 | (1) |
|
|
2 | (1) |
|
Identity and access management |
|
|
3 | (1) |
|
|
3 | (1) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (6) |
|
|
7 | (4) |
|
Distributed responsibility in public cloud computing |
|
|
11 | (1) |
|
Assume breach and isolation |
|
|
12 | (3) |
|
Azure security architecture |
|
|
15 | (2) |
|
|
17 | (2) |
Chapter 2 Identity protection in Azure |
|
19 | (32) |
|
Authentication and authorization |
|
|
19 | (6) |
|
|
20 | (1) |
|
Role-Based Access Control |
|
|
21 | (4) |
|
|
25 | (9) |
|
|
25 | (3) |
|
|
28 | (6) |
|
Suspicious activity identification |
|
|
34 | (2) |
|
|
36 | (8) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (1) |
|
|
42 | (2) |
|
Multi-Factor Authentication |
|
|
44 | (7) |
|
Azure Multi-Factor Authentication implementation |
|
|
45 | (3) |
|
Azure Multi-Factor Authentication option configuration |
|
|
48 | (3) |
Chapter 3 Azure network security |
|
51 | (36) |
|
Anatomy of Azure networking |
|
|
52 | (19) |
|
Virtual network infrastructure |
|
|
53 | (3) |
|
|
56 | (1) |
|
|
57 | (2) |
|
Remote access (Azure gateway/point-to-site VPN/RDP/Remote PowerShell/SSH) |
|
|
59 | (3) |
|
Cross-premises connectivity |
|
|
62 | (3) |
|
|
65 | (2) |
|
|
67 | (2) |
|
|
69 | (1) |
|
Network security appliances |
|
|
69 | (1) |
|
|
69 | (2) |
|
Azure Network Security best practices |
|
|
71 | (16) |
|
Subnet your networks based on security zones |
|
|
73 | (1) |
|
Use Network Security Groups carefully |
|
|
74 | (1) |
|
Use site-to-site VPN to connect Azure Virtual Networks |
|
|
75 | (1) |
|
Configure host-based firewalls on laaS virtual machines |
|
|
76 | (1) |
|
Configure User Defined Routes to control traffic |
|
|
77 | (1) |
|
|
78 | (1) |
|
Deploy virtual network security appliances |
|
|
79 | (1) |
|
Create perimeter networks for Internet-facing devices |
|
|
80 | (1) |
|
|
80 | (1) |
|
Optimize uptime and performance |
|
|
81 | (2) |
|
Disable management protocols to virtual machines |
|
|
83 | (1) |
|
Enable Azure Security Center |
|
|
84 | (1) |
|
Extend your datacenter into Azure |
|
|
85 | (2) |
Chapter 4 Data and storage security |
|
87 | (20) |
|
Virtual machine encryption |
|
|
88 | (1) |
|
|
89 | (3) |
|
|
92 | (2) |
|
File share wire encryption |
|
|
94 | (2) |
|
|
96 | (3) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (6) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
103 | (1) |
|
Transparent data encryption |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (2) |
Chapter 5 Virtual machine protection with Antimalware |
|
107 | (16) |
|
Understanding the Antimalware solution |
|
|
107 | (2) |
|
|
109 | (14) |
|
Antimalware deployment to an existing VM |
|
|
110 | (5) |
|
Antimalware deployment to a new VM |
|
|
115 | (5) |
|
|
120 | (3) |
Chapter 6 Key management in Azure with Key Vault |
|
123 | (14) |
|
|
123 | (3) |
|
App configuration for Key Vault |
|
|
126 | (6) |
|
Key Vault event monitoring |
|
|
132 | (5) |
Chapter 7 Azure resource management security |
|
137 | (20) |
|
Azure Security Center overview |
|
|
137 | (3) |
|
|
138 | (2) |
|
Onboard resources in Azure Security Center |
|
|
140 | (4) |
|
|
144 | (8) |
|
|
147 | (5) |
|
Respond to security incidents |
|
|
152 | (5) |
Chapter 8 Internet of Things security |
|
157 | (20) |
|
|
157 | (8) |
|
Things of the world, unite |
|
|
158 | (2) |
|
Sensors, sensors everywhere |
|
|
160 | (3) |
|
Big data just got bigger: TMI |
|
|
163 | (2) |
|
Artificial intelligence to the rescue |
|
|
165 | (1) |
|
|
165 | (5) |
|
|
165 | (2) |
|
Ramifications of an insecure loT |
|
|
167 | (3) |
|
|
170 | (1) |
|
Windows 10 loT and Azure loT |
|
|
171 | (6) |
|
|
172 | (1) |
|
Azure loT Suite and secure Azure loT infrastructure |
|
|
173 | (4) |
Chapter 9 Hybrid environment monitoring |
|
177 | (16) |
|
Operations Management Suite Security and Audit solution overview |
|
|
177 | (1) |
|
Log Analytics configuration |
|
|
178 | (2) |
|
Windows Agent installation |
|
|
180 | (3) |
|
Resource monitoring using OMS Security and Audit solution |
|
|
183 | (10) |
|
Security state monitoring |
|
|
184 | (4) |
|
Identity and access control |
|
|
188 | (1) |
|
|
189 | (4) |
Chapter 10 Operations and management in the cloud |
|
193 | (10) |
|
|
193 | (1) |
|
|
194 | (2) |
|
Azure Security Center for operations |
|
|
196 | (2) |
|
Azure Security Center for incident response |
|
|
198 | (3) |
|
Azure Security Center for forensics investigation |
|
|
201 | (2) |
Index |
|
203 | (7) |
About the authors |
|
210 | |