Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Microsoft Azure Security Infrastructure

by: Yuri Diogenes, Tom Shinder, Debra Shinder

Notify me when in stock

On-line Price: $37.95 (includes GST)

Paperback package 224

14%Off Retail Price

You save: $6.00

This item is available to backorder. Usually ships within 3 - 4 weeks.

Retail Price: $43.95

Publisher: MICROSOFT PRESS,01.11.16


ISBN: 150930357X
ISBN13: 9781509303571

Add to Shopping Cart

Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve.

Three Microsoft Azure experts show you how to:

- Understand cloud security boundaries and responsibilities
- Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection
- Explore Azure's defense-in-depth security architecture
- Use Azure network security patterns and best practices
- Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security
- Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines
- Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information
- Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite
- Effectively model threats and plan protection for IoT systems
- Use Azure security tools for operations, incident response, and forensic investigation


Chapter 1 Cloud security


Cloud security considerations



Risk management


Identity and access management


Operational security


Endpoint protection


Data protection


Shared responsibility

Cloud computing


Distributed responsibility in public cloud computing


Assume breach and isolation

Azure security architecture

Azure design principles

Chapter 2 Identity protection in Azure


Authentication and authorization

Azure hierarchy


Role-Based Access Control


On-premises integration

Azure AD Connect




Suspicious activity identification

Identity protection

User risk policy


risk policy


Notification enabling




Multi-Factor Authentication

Azure Multi-Factor Authentication implementation


Azure Multi-Factor Authentication option configuration


Chapter 3 Azure network security


Anatomy of Azure networking

Virtual network infrastructure


Network access control


Routing tables


Remote access (Azure gateway/point-to-site VPN/
RDP/Remote PowerShell/SSH)


Cross-premises connectivity


Network availability


Network logging


Public name resolution


Network security appliances


Reverse proxy


Azure Network Security best practices

Subnet your networks based on security zones


Use Network Security Groups carefully


Use site-to-site VPN to connect Azure Virtual Networks


Configure host-based firewalls on IaaS virtual machines


Configure User Defined Routes to control traffic


Require forced tunneling


Deploy virtual network security appliances


Create perimeter networks for Internet-facing devices


Use ExpressRoute


Optimize uptime and performance


Disable management protocols to virtual machines


Enable Azure Security Center


Extend your datacenter into Azure


Chapter 4 Data and storage security


Virtual machine encryption

Azure Disk Encryption

Storage encryption

File share wire encryption

Hybrid data encryption



Wire security


Data at rest


Rights management

Database security

Azure SQL Firewall


SQL Always Encrypted


Row-level security


Transparent data encryption


Cell-level encryption


Dynamic data masking


Chapter 5 Virtual machine protection with Antimalware


Understanding the Antimalware solution

Antimalware deployment

Antimalware deployment to an existing VM


Antimalware deployment to a new VM


Antimalware removal


Chapter 6 Key management in Azure with Key Vault


Key Vault overview

App configuration for Key Vault

Key Vault event monitoring

Chapter 7 Azure resource management security


Azure Security Center overview

Detection capabilities


Onboard resources in Azure Security Center

Apply recommendations

Resource security health


Respond to security incidents

Chapter 8 Internet of Things security


Anatomy of the IoT

Things of the world, unite


Sensors, sensors everywhere


Big data just got bigger: TMI


Artificial intelligence to the rescue


IoT security challenges

IoT: Insecure by design


Ramifications of an insecure IoT


IoT threat modeling

Windows 10 IoT and Azure IoT

Windows 10 IoT editions


Azure IoT Suite and secure Azure IoT infrastructure


Chapter 9 Hybrid environment monitoring


Operations Management Suite Security and Audit solution overview

Log Analytics configuration

Windows Agent installation

Resource monitoring using OMS Security and Audit solution

Security state monitoring


Identity and access control


Alerts and threats


Chapter 10 Operations and management in the cloud



Design considerations

Azure Security Center for operations

Azure Security Center for incident response

Azure Security Center for forensics investigation



About the authors