Chapter 6: Managing Linux Security and Identities
In the previous chapter, we discussed handling storage, along with network and process management. However, as a system administrator, your primary goal is to secure your Linux machine to deny any unauthorized access or limit access to users. In an enterprise environment, security breaches are a massive concern. In this chapter, we'll be covering security—the protection of your workload at the operating system level; for example, if your organization is a financial institution where you will be dealing with workloads that deal with monetary commitments and even the personally identifiable information (PII) of customers, it's critical that you secure the workload to avoid any breaches. Of course, Azure already provides you with services to protect your VMs in many ways and at many levels. The following are a few of these services:
- Azure Resource Manager, which provides security, auditing, and tagging features...