• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946350]
• Literatura piękna
 [1816154]

  więcej...
• Turystyka
 [70666]
• Informatyka
 [151172]
• Komiksy
 [35576]
• Encyklopedie
 [23172]
• Dziecięca
 [611458]
• Hobby
 [135995]
• AudioBooki
 [1726]
• Literatura faktu
 [225763]
• Muzyka CD
 [378]
• Słowniki
 [2917]
• Inne
 [444280]
• Kalendarze
 [1179]
• Podręczniki
 [166508]
• Poradniki
 [469467]
• Religia
 [507199]
• Czasopisma
 [496]
• Sport
 [61352]
• Sztuka
 [242330]
• CD, DVD, Video
 [3348]
• Technologie
 [219391]
• Zdrowie
 [98638]
• Książkowe Klimaty
 [124]
• Zabawki
 [2382]
• Puzzle, gry
 [3525]
• Literatura w języku ukraińskim
 [259]
• Art. papiernicze i szkolne
 [7107]
Kategorie szczegółowe BISAC

Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security

ISBN-13: 9781484265307 / Angielski / Miękka / 2020 / 278 str.

Marshall Copeland; Matthew Jacobs
Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security Marshall Copeland Matthew Jacobs 9781484265307 Apress - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Cyber Security on Azure: An It Professional's Guide to Microsoft Azure Security

ISBN-13: 9781484265307 / Angielski / Miękka / 2020 / 278 str.

Marshall Copeland; Matthew Jacobs
cena 241,50
(netto: 230,00 VAT:  5%)

Najniższa cena z 30 dni: 231,29
Termin realizacji zamówienia:
ok. 16-18 dni roboczych.

Darmowa dostawa!

Intermediate user level

Kategorie:
Informatyka, Bazy danych
Kategorie BISAC:
Computers > Programming - Microsoft
Computers > Security - General
Wydawca:
Apress
Język:
Angielski
ISBN-13:
9781484265307
Rok wydania:
2020
Ilość stron:
278
Waga:
0.51 kg
Wymiary:
25.4 x 17.78 x 1.57
Oprawa:
Miękka
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Part I: Zero Trust Cloud Security 

Chapter 1. Reduce Cybersecurity Vulnerabilities from the Identity Layer  

In this chapter you learn the foundation of Azure active directory and quickly expand on the different capabilities for custom domains to manage Azure Subscriptions and why Identity is the security perimeter in the cloud. Azure directly supports IAM (Identity Access Management), for any size organization as the IT cloud supports secure connection from any device and any location. In this chapter you gain insight into IAM challenges for blue team defense of cyber security attacks.

·         Azure cloud relations to: Azure Tenant, Azure Subscription, Azure AD

o   Azure tenant security

o   Azure subscription security

o   Azure API security

o   Azure resource locks

·         Managing Azure Active Directory: Users, and Groups

·         Azure Active Directory OAuth, SAML, AD Connect

·         Security measures:

o   Azure Application Permission Scopes, consent

o   Configure Multi-Factor Authentication

o   Conditional Access Policies

·         Configure Azure AD Privileged Identity Management

 

Chapter 2 Azure Network Security Configuration  

Software defined network is titled VNet in Azure and introduces new security challenges for cloud security architect when it comes to isolate data and still allow secure communication from valid users, applications and systems. In this chapter you learn security supported networking in Azure with the guides to present TCP/IP, protocol communication ports and what Azure security services are available to learn about notable tactics, techniques and procedures (TTPs) that can be exploited by Advanced Persistent Threats (APT). You learn VNet recommendations to mitigate misconfigurations and provide detection on Incidents of Compromise (IOC) like forensic evidence of potential intrusions. 

·         Virtual Networks, VNets, Network Peering

·         NSG, Port vulnerability, OSI / TCP Model

·         Azure Firewall Configurations

·         Azure Front Door Service

·         Application Security Groups

·         Remote Access Management

 Chapter 3 Reduce Cybersecurity Vulnerabilities from IaaS and Data 

Operational frameworks and cyber security frameworks work hand-in-hand to support the business. The framework helps to prepare and enable steps to prevent penetration from globally attacks.  In this chapter you learn through examples about advanced persistent threats (APT) using techniques, tactics and procedures to reduce risk to specific threats.

·         Harden Azure VMs

·         VM Security

·         VM Endpoint Security

·         VM OS security updates

·         Database configurations (Best Practices)

o   Authentication

o   Auditing

o   SQL Advanced Threat Protection

·         Storage Accounts (data access)

·         Key Management (best practices)

·         Azure Files authentication

·         Shared Access Signatures (SAS)

·         HDInsight Security

Part II: Azure Cloud Security Operations (Red Team / Blue Team)

(150 pages)

This section of the book is focused on identifying the vulnerabilities from a Red Team perspective (aka Black Hat) and how the Blue Team (White Hat) could defend from the attack. The topics are the same but the Red teams view to help train the Blue teams defense on specific cloud targets.  During the chapters in Part II the reader is guided through many attack matrix from https://attack.mitre.org/ and C2Matrix examples of attackers and their attack techniques. 

 

Chapter 4 Configure Azure Monitoring for Blue Team Hunting

In this chapter readers learn about monitoring the availability of applications and services provide the insight on all Azure services from VM, to containers and cloud services specific to Microsoft Azure.  Logs are divided into two functional types, Metrics, and logs.  Azure has continued to expand insight by collecting this data and displaying in for alerts and management datapoints to respond appropriately. 

Data collected includes tenant and subscription data in attrition to all Azure resources. Metrics are near real time data (review using Metrics Explorer), reviews data at a specific point of time.  Logs have different properties based on the type of logs. Streamed to an Analytics workspace for Alerting and review information over long periods of time.

·         Azure Monitor enablement

·         Logs sources and types of logs

·         Diagnostic logs & retention

·         Azure analytics

·         Privileged Identity Management Configuration

·         Monitor Privileged Access Best Practices

·         Manage API access Best Practices

·         Manage Azure subscription transfers (M&A activities)

 

Chapter 5 Azure Security Center Configuration

Azure Security Center was introduced in the First Editions, and the reader continues their journey with a deep dive on considerations for reducing other security tools. You learn how to ingest log files from Azure environment and auto discover IaaS resources to reduce the “shadow IT” expansion.  In this chapter the Cyber Security Kill Chain is front-and-center as you learn to configure alerts on known exploits. Again the reinforcement of the Attack Matrix is used to correlate and guide the Cloud Operations team into Cloud Security Operations.

·         Configuration cost (consolidation considerations)

·         Enable security:

o   Network

o   VMs

o   Database

o   BLOBs

·         Data Protection

·         Configure Alerting

·         Central policy management with Security Center

·         Just in Time VM access with Security Center

·         Azure Sentinel

 

Chapter 6 Azure Kubernetes Service and Container Security

A NEW chapter in the second edition, takes the reader beyond the introduction to Kubernetes, it guides them on why containers are not secure by default.  You learn container weakness and how to mitigate with security controls to secure Azure containers and the Azure Kubernetes Service (AKS).

You learn to use Azure Security Center to identify the different Alerts from a Windows OS and Linux OS running in Azure IaaS configuration. Threat protection with Security Center expands the benefits of a cloud-native solution and you learn how using the security controls support your companies Cyber Security Framework.

·         Container Network Configuration

·         Authentication

·         Container isolation

·         AKS Security focus

·         Securing the container registry

·         Container vulnerability management

 

Chapter 7 Security Governance Operations 

A NEW chapter that uses many exercises to provide Azure Policy definition structure and readers learn how the policies take effect on users based on business rules. The exercises examples help readers evaluate the impact and what the logical evaluation of an Azure policy and how to customize the JSON policy definitions.   Additional policies apply directly to Azure Kubernetes Services (AKS), to support the Information Security Officers team goals of improved security controls and reporting.

·         Azure Policies (overview)

o   Assignments

o   Definitions

o   Blueprints

·         Compliance reports

·         Configure Azure Monitor

o   Diagnostic logging

o   Log retention

o   Vulnerability scanning

·         Data Management

o   Classification

o   Retention

o   Sovereignty

 

Appendix A (10-20 pages)

·         Azure Penetration Testing Configuration

Appendix B (10-20 pages)

·         Configure an Azure Cloud Cyber Security lab for education


Marshall Copeland is a cloud security architect focused on helping customers “shift left” with cloud security defenses in Azure public cloud using cloud-native services and third-party network security appliances. He uses Infrastructure as Code (IaC) with ARM templates or Terraform HCL to build cloud infrastructure and disaster recovery solutions. Marshall's Azure security design skills include Azure Sentinel, Security Center, Policy, Firewall and ACL networking, and a few open-source solutions such as ELK stack, Wireshark, and Snort. He partners with security operations to guide cloud investigations to enhance “blue team hunting” efficiencies.

Matthew Jacobs is a system engineer focused on cloud architecture technologies needed to support identity management, security, and collaboration tool sets for small and medium businesses, including enterprise organizations. His work has focused on digital transformation, including on-premise only, hybrid cloud networks, and complete public cloud-only deployment. Matthew brings a hands-on cloud architecture approach for Identity Management (IAM) and enhanced engineering to enable business agility that secures and supports a global remote work force. His current work in the Nashville, Tennessee area includes Fortune 500 media, entertainment, and hospitality companies, and his work history extends into public cloud federal compliance requirements for the banking and healthcare industries.  

Prevent destructive attacks to your Azure public cloud infrastructure, remove vulnerabilities, and instantly report cloud security readiness. This book provides comprehensive guidance from a security insider's perspective.

Cyber Security on Azure supports cloud security operations and cloud security architects by supplying a path to clearly identify potential vulnerabilities to business assets and reduce security risk in Microsoft Azure subscription. This updated edition explores how to “lean-in” and recognize challenges with IaaS and PaaS for identity, networks, applications, virtual machines, databases, and data encryption to use the variety of Azure security tools. You will dive into Azure Cloud Security to guide cloud operations teams to become more security focused in many areas and laser focused on security configuration. New chapters cover Azure Kubernetes Service and Container security and you will get up and running quickly with an overview of Azure Sentinel SIEM Solution.

You will:
  • Understand enterprise privileged identity and security policies
  • "Shift left" with security controls in Microsoft Azure
  • Configure intrusion detection and alerts
  • Reduce security risks using Azure Security Service

Copeland, Marshall Marshall Copeland, a Microsoft Datacenter Speciali... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia