001433007 000__ 06501cam\a2200649\a\4500 001433007 001__ 1433007 001433007 003__ OCoLC 001433007 005__ 20230309003544.0 001433007 006__ m\\\\\o\\d\\\\\\\\ 001433007 007__ cr\un\nnnunnun 001433007 008__ 201220s2021\\\\xxu\\\\\o\\\\\001\0\eng\d 001433007 019__ $$a1228040109$$a1228845949$$a1231608697$$a1235842743$$a1236894867$$a1237468487$$a1238202346$$a1238203419$$a1238203750$$a1240510205$$a1249944440$$a1302288888 001433007 020__ $$a9781484265314$$q(electronic bk.) 001433007 020__ $$a1484265319$$q(electronic bk.) 001433007 020__ $$a9781484265321$$q(print) 001433007 020__ $$a1484265327 001433007 020__ $$z1484265300 001433007 020__ $$z9781484265307 001433007 0247_ $$a10.1007/978-1-4842-6531-4$$2doi 001433007 035__ $$aSP(OCoLC)1227448974 001433007 040__ $$aYDX$$beng$$epn$$cYDX$$dGW5XE$$dOCLCO$$dUPM$$dEBLCP$$dVT2$$dOCLCF$$dDCT$$dERF$$dTOH$$dLDP$$dLEATE$$dOCL$$dLVT$$dOCLCQ$$dOCLCO$$dCOM$$dOCLCQ 001433007 049__ $$aISEA 001433007 050_4 $$aQA76.9.A25 001433007 08204 $$a005.8$$223 001433007 1001_ $$aCopeland, Marshall. 001433007 24510 $$aCyber security on Azure :$$ban it professional's guide to Microsoft Azure security /$$cMarshall Copeland, Matthew Jacobs. 001433007 250__ $$a2nd ed. 001433007 260__ $$a[Place of publication not identified] :$$bApress,$$c2021. 001433007 300__ $$a1 online resource 001433007 336__ $$atext$$btxt$$2rdacontent 001433007 337__ $$acomputer$$bc$$2rdamedia 001433007 338__ $$aonline resource$$bcr$$2rdacarrier 001433007 347__ $$atext file 001433007 347__ $$bPDF 001433007 500__ $$aIncludes index. 001433007 5050_ $$aIntro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Part I: Zero Trust Cloud Security -- Chapter 1: Reduce Cyber Security Vulnerabilities: Identity Layer -- Azure Cloud Relations: Tenant, Subscription, Resources -- Azure Tenant Security -- Azure Subscription Security -- Azure API Security -- Azure Resource Locks -- Managing Azure Active Directory: Users and Groups -- Azure Users -- Azure Groups -- Azure Active Directory: OAuth, SAML, AD Connect -- OAuth -- SAML -- AD Connect -- Federation with ADFS -- Non-federation 001433007 5058_ $$aSecurity Measures -- Azure Application Permission Scopes -- Configure Multi-Factor Authentication -- Enabling Security Defaults -- Self-Service Password Reset -- Conditional Access Policies -- Azure AD Privileged Identity Management -- Summary -- Chapter 2: Azure Network Security Configuration -- Virtual Network Overview -- VNets -- Network Security Group -- VNet Security Best Practices -- Network Peering -- Application Security Groups -- TCP/IP Port Vulnerability -- Azure Front Door Service -- Remote Access Management -- Azure Bastion Host -- Summary 001433007 5058_ $$aChapter 3: Reduce Cyber Security Vulnerabilities: IaaS and Data -- Azure Security with IaC -- ARM Development -- Harden Azure VMs -- Patching the VM Directly -- VM Security and Endpoint Protection -- Database Security -- DB Best Practices -- DB Authentication -- Database Auditing -- Storage Accounts -- Shared Access Signatures -- Key Management -- Summary -- Part II: Azure Cloud Security Operations -- Chapter 4: Configure Azure Monitoring for Blue Team Hunting -- Azure Data Platform -- Azure Logs -- Azure Metrics -- Azure Monitor and Log Analytics Enablement 001433007 5058_ $$aLog Analytics Workspace Security Strategy -- Guest OS Metrics and Logs -- Connecting Data Sources to Log Analytics Workspace -- Summary -- Chapter 5: Azure Security Center and Azure Sentinel -- Cloud Security Challenges -- Enable Security -- Configuration Value -- Standard Tier Advantages -- Just-in-Time Access -- Advanced Threat Detection -- Anomaly Detection -- Crash Analysis -- Threat Intelligence -- Behavioral Analysis -- Configure Alerting -- Using Security Center -- Compute and Apps -- Network -- Data and Storage -- Azure Sentinel -- Connect to Data Streams -- Using Azure Sentinel 001433007 5058_ $$aLogs Pane -- Analytics Pane -- Hunting -- Summary -- Chapter 6: Azure Kubernetes Services: Container Security -- Microservices -- Containers, Docker, and Kubernetes -- Azure Kubernetes Services and Security -- Authentication -- Container Security -- AKS Security with Security Center and Sentinel -- Kubernetes Security with Azure Policy -- Summary -- Chapter 7: Security Governance Operations -- Azure Governance Architecture -- Management Groups -- Azure Policy -- Compliance Reporting -- Assignments -- Blueprints -- Role-Based Access Control -- Azure Cost Management -- Data Governance 001433007 506__ $$aAccess limited to authorized users. 001433007 520__ $$aPrevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective. Cyber Security on Azure supports cloud security operations and cloud security architects by supplying a path to clearly identify potential vulnerabilities to business assets and reduce security risk in Microsoft Azure subscription. This updated edition explores how to "lean-in" and recognize challenges with IaaS and PaaS for identity, networks, applications, virtual machines, databases, and data encryption to use the variety of Azure security tools. You will dive into Azure Cloud Security to guide cloud operations teams to become more security focused in many areas and laser focused on security configuration. New chapters cover Azure Kubernetes Service and Container security and you will get up and running quickly with an overview of Azure Sentinel SIEM Solution. You will: Understand enterprise privileged identity and security policies "Shift left" with security controls in Microsoft Azure Configure intrusion detection and alerts Reduce security risks using Azure Security Service 001433007 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed February 26, 2021). 001433007 650_0 $$aMicrosoft Azure (Computing platform) 001433007 650_0 $$aComputer security. 001433007 650_0 $$aCloud computing$$xSecurity measures. 001433007 650_6 $$aSécurité informatique. 001433007 650_6 $$aInfonuagique$$xSécurité$$xMesures. 001433007 655_0 $$aElectronic books. 001433007 7001_ $$aJacobs, Matthew,$$eauthor. 001433007 77608 $$iPrint version:$$aCopeland, Marshall.$$tCyber security on Azure.$$b2nd ed.$$d[Place of publication not identified] : Apress, 2021$$z1484265300$$z9781484265307$$w(OCoLC)1195469640 001433007 852__ $$bebk 001433007 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-1-4842-6531-4$$zOnline Access$$91397441.1 001433007 909CO $$ooai:library.usi.edu:1433007$$pGLOBAL_SET 001433007 980__ $$aBIB 001433007 980__ $$aEBOOK 001433007 982__ $$aEbook 001433007 983__ $$aOnline 001433007 994__ $$a92$$bISE