Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Design and Deploy a Secure Azure Environment - Puthiyavan Udayakumar

Design and Deploy a Secure Azure Environment

Mapping the NIST Cybersecurity Framework to Azure Services
Buch | Softcover
695 Seiten
2023 | 1st ed.
Apress (Verlag)
978-1-4842-9677-6 (ISBN)
CHF 89,85 inkl. MwSt
Beginning-Intermediate user level
Follow this comprehensive guide as it provides you with a deep understanding of Azure security principles, best practices, and implementation strategies aligned with the NIST Cybersecurity Framework (CSF). The book covers various topics from Azure security to designing and deploying solutions for infrastructure, data, and applications, including identify, protect, detect, respond, and recover solutions, in line with the NIST CSF.
The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.

After reading this book, you will understand NIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF.

What You Will Learn

  • Design and deploy security for infrastructure, data, and applications
  • Design and deploy an identify solution
  • Design and deploy a protect solution
  • Design and deploy a detect solution
  • Design and deploy a respond solution
  • Design and deploy a recover solution
Who This Book Is For

Cyber system administrators and architects working with Microsoft Azure integrated services

Puthiyavan Udayakumar is an infrastructure architect with over 15 years of experience in modernizing and securing IT infrastructure, including the cloud. He has been writing technical books for more than 10 years on various infrastructure and cybersecurity domains. He has designed, deployed, and secured IT infrastructure on premises and in the cloud, including virtual servers, networks, storage, and desktops for various industries (including pharmaceutical, banking, healthcare, aviation, federal entities, etc.). He is an open group certified Master certified architect.

lt;b>Chapter 1: Getting Started with Azure Security  

o    Introduction to Cloud Security

o    Best practices for securing enterprise cloud

o    Create an overall security design baseline

o    Define Security Operations Strategy

o    Overview of NIST Cybersecurity framework

Chapter 2: Design and deploy security for infrastructure, data and apps

o    Design and deploy a strategy for securing server and client endpoints

o    Design and deploy a strategy for securing SaaS, PaaS, and IaaS services

o    Design and deploy security for data across Azure enterprise environment

o    Design and deploy security for application across Azure enterprise environment

Chapter 3: Design and deploy Identify solution.

o    Introduction to Azure identify security services

o    Design and deploy Azure information protection

o    Design and deploy Azure network watcher

o    Design and deploy Azure Policy

Chapter 4: Design and deploy Identify solution.

o    Design and deploy Azure Automation

o    Design and deploy Azure IoT Hub

o    Design and deploy Microsoft Intune

o    Design and deploy Service Map

o    Enable Security Center

Chapter 5: Design and deploy detect solution.

o    Design and deploy Azure Intelligent Security Graph

o    Design and deploy Azure monitor

o    Design and deploy Azure Sentinel

Chapter 6: Design and deploy protect solution

o    Design and deploy Azure Application gateway

o    Design and deploy Azure Firewall

o    Design and deploy Azure WAF

Chapter 7: Design and deploy protect solution.

o    Design and deploy Azure AD and AD Identity protection

o    Design and deploy Azure DDoS

o    Design and deploy Azure NSG

Chapter 8: Design and deploy protect solution.

o    Design and deploy Azure NSG

o    Design and deploy Azure Bastion

o    Design and deploy Azure Encryption

Chapter 9: Design and deploy respond solution

o    Design and deploy Azure Logic Apps

o    Design and deploy Azure Encryption

o    Define your security team

Chapter 10: Design and deploy recover solution

o    Design and deploy Azure Backup

o    Design and deploy Site recovery

Erscheinungsdatum
Zusatzinfo 63 Illustrations, black and white; XXVII, 695 p. 63 illus.
Verlagsort Berkley
Sprache englisch
Maße 178 x 254 mm
Themenwelt Mathematik / Informatik Informatik Software Entwicklung
Schlagworte Azure • cyber security • Governance • Microsoft architecture • Risk complaince • security
ISBN-10 1-4842-9677-X / 148429677X
ISBN-13 978-1-4842-9677-6 / 9781484296776
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Grundlagen, Prozesse, Methoden und Werkzeuge

von Jörg Schäuffele; Thomas Zurawka

Buch | Hardcover (2024)
Springer Vieweg (Verlag)
CHF 139,95
Deterministische und randomisierte Algorithmen

von Volker Turau; Christoph Weyer

Buch | Softcover (2024)
De Gruyter Oldenbourg (Verlag)
CHF 89,95