Summary
In this chapter, we looked at why we need to think about our application architecture in terms of securing access, and which tools can help us achieve this.
We looked at using a layered network approach to securely lock down our backend data by employing tools such as VNet integration, SQL firewalls, Azure Firewall, Azure Application Gateway, and Azure Front Door.
We then looked at securing the connection strings to our databases, why we need to do this, and, again, the different options, such as Azure Key Vault and managed identities.
In the next chapter, we will look at how to control what users can do within Azure using its built-in governance tools.