Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Azure Strategy and Implementation Guide, Fourth Edition
  • Table Of Contents Toc
  • Feedback & Rating feedback
Azure Strategy and Implementation Guide, Fourth Edition

Azure Strategy and Implementation Guide, Fourth Edition

By : Jack Lee, Pokkunuri, Leonardo, Milgram, David Rendón
close
close
Azure Strategy and Implementation Guide, Fourth Edition

Azure Strategy and Implementation Guide, Fourth Edition

By: Jack Lee, Pokkunuri, Leonardo, Milgram, David Rendón

Overview of this book

Microsoft Azure is a powerful cloud computing platform that offers a multitude of services and capabilities for organizations of any size moving to a cloud strategy. This fourth edition comes with the latest updates on cloud security fundamentals, hybrid cloud, cloud migration, Microsoft Azure Active Directory, and Windows Virtual Desktop. It encapsulates the entire spectrum of measures involved in Azure deployment that includes understanding Azure fundamentals, choosing a suitable cloud architecture, building on design principles, becoming familiar with Azure DevOps, and learning best practices for optimization and management. The book begins by introducing you to the Azure cloud platform and demonstrating the substantial scope of digital transformation and innovation that can be achieved with Azure's capabilities. The guide also acquaints you with practical insights into application modernization, Azure Infrastructure as a Service (IaaS) deployment, infrastructure management, key application architectures, best practices of Azure DevOps, and Azure automation. By the end of this book, you will have acquired the skills required to drive Azure operations from the planning and cloud migration stage to cost management and troubleshooting.
Table of Contents (10 chapters)
close
close
8
8. Conclusion
9
Index

Best practices for securing your network

In the previous section of this chapter, Security operations excellence, we reviewed the Zero Trust principle. This assumes that breaches are inevitable and therefore we must ensure we have the right controls in place to verify each request. Identity management plays a critical role in this.

There are three principal objectives for securing your network in the Zero Trust model:

  • Preparing to handle attacks in advance
  • Reducing the attack surface and the extent of damage
  • Strengthening your cloud footprint, including resources and configurations that are part of your environment, to reduce the chances of getting compromised

If your organization is enabling remote work and implementing an end-to-end Zero Trust framework, there are some best practices to adhere to in order to achieve these objectives:

  • Network segmentation
  • Threat protection
  • Encryption

Let's take a closer look at each of them.

...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech
bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY