Chapter 5: Securing Your Azure Stack Hub Instance
Following on from the previous chapter where we covered identity, the next logical step is to move on and delve into security. In this chapter, we are going to focus on the infrastructure security available within Microsoft Azure Stack Hub. We will also cover how Microsoft Azure Stack Hub compliance is managed and the tools that can be used to ensure that security is maintained within Microsoft Azure Stack Hub. We will cover security best practices within Microsoft Azure Stack Hub to ensure that we limit the attack surface available to hackers. We will also cover tools for investigating breaches. This chapter will help you understand and describe the approach that Microsoft takes toward security within Azure Stack Hub.
The following sections will provide coverage of these topics:
- Overview of infrastructure security
- Understanding the benefits of a locked system
- Reviewing Azure Stack Hub integrated compliance
- Approaching...