Architectural overview and considerations
As we have discussed, security is at the foundation of cloud principles, and key to this in Azure is understanding how RBAC works. As we showed earlier in the chapter, leveraging management groups is also extremely helpful in your subscription access management, and with RBAC you only provide users the minimum amount of access needed to complete their jobs. This can also be coupled with Privileged Identity Management (PIM) should the need arise for a member to elevate their access or "just-in-time" their access within a given environment for a given time, which helps with approvals and auditing.
It's worth getting more details on the following list of tools and resources that are available in Azure to aid in security:
- RBAC
- Antimalware
- MFA
- PIM
- ExpressRoute
- VPN (alternatively called Virtual Network Gateway)
- Identity Protection
- Security Center
- Intelligent Security Graph