Summary
In this chapter, we covered how to implement best practices for host security in Azure. We learned about reducing the risks of introducing vulnerabilities by choosing a hardened VM image, implementing an update management process, and continuously scanning VMs for vulnerabilities. We also learned how to implement disk encryption to protect against data exfiltration.
Finally, we covered how to implement JIT access for sensitive VM management ports to reduce the attack surface that's exposed to external adversaries.
The information in this chapter has equipped you with the skills needed to protect your VM workloads in Azure.
See you in the next chapter!