Securing Virtual Machines
In the previous chapter, we covered recipes that allow you to provide secure remote access to Azure resources and minimize exposure to management ports on Azure Virtual Machines (VMs).
When we create Azure VMs or any Azure resource, we should take a defense-in-depth (DiD) approach. This means we should not rely on just the identity or network and remote access layers to secure our resources. We should, in addition, also apply protection controls at the resource layer, often referred to as workload protection.
This chapter will teach you how to secure and protect Azure VMs. We will break down the chapter into sections, covering using the VM Update Management service and protection through the Microsoft Antimalware service and disk encryption.
By the end of this chapter, you will have gained skills for securing Azure VMs through the following recipes:
- Implementing VM Update Management
- Implementing VM Microsoft Antimalware
- Implementing...