
Azure Stack Hub Demystified
By :

Following on from the previous chapter where we covered identity, the next logical step is to move on and delve into security. In this chapter, we are going to focus on the infrastructure security available within Microsoft Azure Stack Hub. We will also cover how Microsoft Azure Stack Hub compliance is managed and the tools that can be used to ensure that security is maintained within Microsoft Azure Stack Hub. We will cover security best practices within Microsoft Azure Stack Hub to ensure that we limit the attack surface available to hackers. We will also cover tools for investigating breaches. This chapter will help you understand and describe the approach that Microsoft takes toward security within Azure Stack Hub.
The following sections will provide coverage of these topics:
Change the font size
Change margin width
Change background colour