Summary
In this chapter, we introduced Microsoft Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.
Finally, we looked at the potential cost of running Microsoft Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.
In the next chapter, we will take the first steps toward deploying Microsoft Sentinel by configuring an Azure Monitor Log Analytics workspace. Azure Monitor is the bedrock of Microsoft Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Microsoft Sentinel in your environment.