Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Azure Stack Hub Demystified
  • Toc
  • feedback
Azure Stack Hub Demystified

Azure Stack Hub Demystified

By : Young
5 (5)
close
Azure Stack Hub Demystified

Azure Stack Hub Demystified

5 (5)
By: Young

Overview of this book

Azure Stack Hub is the on-premise offering from Microsoft, which provides Azure Cloud services within a customer's own data center. It provides consistent processes between on-site and the cloud, allowing developers to test locally and deploy to the cloud in exactly the same manner. Azure Stack Hub Demystified provides complete coverage of deploying, configuring, administrating, and running Microsoft Azure Stack Hub efficiently. Firstly, you will learn how to deploy Azure Stack Hub within an organization. As you progress, you'll understand configuration and the different services provided by the platform. The book also focuses on the underlying architecture and connectivity options for the modern data center. Later, you will understand various approaches to DevOps and their implementation, and learn key topics for the AZ-600 exam. By the end of this Azure book, you will have a thorough understanding of Azure Stack Hub and the services that are provided by the platform, along with the confidence and information you need to be able to pass the AZ-600 exam.
Table of Contents (21 chapters)
close
1
Section 1: Architecture and Deployment
5
Section 2: Identity and Security
9
Section 3: Features
15
Section 4: Monitoring, Licensing, and Billing

Summary

This chapter has provided us with comprehensive coverage of all of the components within Azure Stack Hub that are used for security. We started the chapter with a look at the security infrastructure that underpins Azure Stack Hub. We learned about the security vision for Azure Stack Hub as defined by Microsoft. We then walked through the two security postures for Azure Stack Hub.

We covered the hardened by default posture, which is built from the hardware upward. We saw how to reduce the software attack surface, which included things such as ACLs, BitLocker, and certificates. We learned how to use BitLocker to encrypt the storage and also how to rotate certificates. We talked about the assume breach posture and also covered a number of Microsoft security best practices.

We then discussed the benefits of a closed system before moving on to look at Azure Stack Hub compliance with internationally recognized standards such as PCI-DSS. Finally, we took a walk through SIEM...

bookmark search playlist font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete