Protect your solutions from malicious users using Microsoft Azure Services
About This Book
Explore the security hot spots in the Azure PaaS and IaaS services Understand the basic principles of IT security and application security to reduce exposure and shield your services from vulnerabilities This is a step-by-step guide filled with best-practices to apply with Identity and Access Management, and keep your services secure
Who This Book Is For
This book is intended for Azure administrators who want to understand the application of security principles in distributed environments and how to use Azure to its full capability to reduce the risks of security breaches. Only basic knowledge of the security processes and services of Microsoft Azure is required.
What You Will Learn
Recognize the basic principles of IT security to protect your applications Implement authentication solutions within applications with Azure Services Analyze use cases of Azure usage, regarding services that are PaaS such as websites, SQL Databases, and storage Analyze use cases of Azure usage, regarding services that are IaaS such as Virtual Machines and Virtual Networks Use Azure Cloud-based identity solutions in applications Assess risks to build a complete map of what to monitor Identify and avoid common pitfalls while developing web applications
In Detail
Microsoft Azure Security helps you ensure that all your applications and services stay secure and safe from any threats. Starting with a quick tour through the fundamentals of security standards, you will quickly gain a comprehensive overview of Azure Services where security has to be managed directly. You will then see some use cases of Azure usage, exploring the various building blocks of the entire platform. This will help you get involved with the services covered in the ensuing chapters.
Next, you will learn to identify, for any given service of Azure, where the possible traps are and how malicious behaviors could lead up to a huge loss in terms of information and consequently, money. Finish with a flourish by implementing authentication solutions within applications with Azure Services and learn the best practices for Azure-related IT resources. With this comprehensive guide, you will learn many of the key security processes along with network, system, and host security and ensure that your applications and services are secure.
Just click on START button on Telegram Bot