-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft Cybersecurity Architect Exam Ref SC-100
By :

In this chapter, we discussed how to design a security strategy for on-premises and cloud virtual machines, as well as other networked endpoints. You also learned how to create a secure access strategy and manage keys, secrets, and certificates with Azure Key Vault. This chapter concluded by providing an understanding of the processes, procedures, and people necessary for security operations, and how to evaluate the effectiveness of your security operations.
In the next chapter, you will learn how to design a strategy for securing SaaS, PaaS, and IaaS. This will include building a security baseline for each of these services while covering security requirements for containers, edge computing, application services, databases, and storage accounts within Azure.
Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
Change the font size
Change margin width
Change background colour