LEADER 04934nam 22006375 450 001 9910494559303321 005 20251202165543.0 010 $a9781484272923 010 $a1484272927 024 7 $a10.1007/978-1-4842-7292-3 035 $a(CKB)5600000000003532 035 $a(MiAaPQ)EBC6714629 035 $a(Au-PeEL)EBL6714629 035 $a(CaSebORM)9781484272923 035 $a(PPN)257357548 035 $a(Perlego)4513574 035 $a(DE-He213)978-1-4842-7292-3 035 $a(EXLCZ)995600000000003532 100 $a20210828d2021 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAzure Security Handbook $eA Comprehensive Guide for Defending Your Enterprise Environment /$fby Karl Ots 205 $a1st ed. 2021. 210 1$aBerkeley, CA :$cApress :$cImprint: Apress,$d2021. 215 $a1 online resource (162 pages) 300 $aIncludes index. 311 08$a9781484272916 311 08$a1484272919 327 $aChapter 1. Introduction to Cloud Security Architecture -- Chapter 2. Identity and Access Management -- Chapter 3. Logging and Monitoring -- Chapter 4. Network Security -- Chapter 5. Workload Protection- Data -- Chapter 6. Workload Protection- Platform-as-a-Service -- Chapter 7. Workload Protection- Containers -- Chapter 8. Workload Protection- IaaS. 330 $aDid you know that the most common cloud security threats happen because of cloud service misconfigurations, not outside attacks? If you did not, you are not alone. In the on-premises world, cybersecurity risks were limited to the organization?s network, but in the era of cloud computing, both the impact and likelihood of potential risks are significantly higher. With the corresponding advent of DevOps methodology, security is now the responsibility of everyone who is part of the application development life cycle, not just the security specialists. Applying the clear and pragmatic recommendations given in this book, you can reduce the cloud applications security risks in your organization. This is the book that every Azure solution architect, developer, and IT professional should have on hand when they begin their journey learning about Azure security. It demystifies the multitude of security controls and offers numerous guidelines for Azure, curtailing hours of learning fatigue and confusion. Throughout the book you will learn how to secure your applications using Azure?s native security controls. After reading this book, you will know which security guardrails are available, how effective they are, and what will be the cost of implementing them. The scenarios in this book are real and come from securing enterprise applications and infrastructure running on Azure. What You Will Learn Remediate security risks of Azure applications by implementing the right security controls at the right time Achieve a level of security and stay secure across your Azure environment by setting guardrails to automate secure configurations Protect the most common reference workloads according to security best practices Design secure access control solutions for your Azure administrative access, as well as Azure application access This book is designed for cloud security architects, cloud application developers, and cloud solution architects who work with Azure. It is also a valuable resource for those IT professionals responsible for securing Azure workloads in the enterprise. Karl Ots is a cloud and cybersecurity leader with more than a decade of experience in Microsoft Azure security. He has worked with large enterprises in fields such as technology, manufacturing, and finance. Karl is recognized as a Microsoft Regional Director, a patented inventor, a LinkedIn Learning instructor, and a Microsoft Azure MVP. He holds the Azure Security Engineer, SABSA Foundation SCF, and CISSP certifications. Karl is a frequent speaker on cloud security topics at global conferences such as Microsoft Ignite or (ISC)2 Security Congress. He hosts the Cloud Gossip podcast. 606 $aMicrosoft software 606 $aMicrosoft .NET Framework 606 $aComputer networks$xSecurity measures 606 $aComputer security 606 $aMicrosoft 606 $aMobile and Network Security 606 $aPrinciples and Models of Security 615 0$aMicrosoft software. 615 0$aMicrosoft .NET Framework. 615 0$aComputer networks$xSecurity measures. 615 0$aComputer security. 615 14$aMicrosoft. 615 24$aMobile and Network Security. 615 24$aPrinciples and Models of Security. 676 $a005.8 700 $aOts$b Karl$f1882-1961,$01236252 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910494559303321 996 $aAzure security handbook$92870730 997 $aUNINA