Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Azure Data and AI Architect Handbook

You're reading from   Azure Data and AI Architect Handbook Adopt a structured approach to designing data and AI solutions at scale on Microsoft Azure

Arrow left icon
Product type Paperback
Published in Jul 2023
Publisher Packt
ISBN-13 9781803234861
Length 284 pages
Edition 1st Edition
Tools
Arrow right icon
Authors (2):
Arrow left icon
Olivier Mertens Olivier Mertens
Author Profile Icon Olivier Mertens
Olivier Mertens
Breght Van Baelen Breght Van Baelen
Author Profile Icon Breght Van Baelen
Breght Van Baelen
Arrow right icon
View More author details
Toc

Table of Contents (18) Chapters Close

Preface 1. Part 1: Introduction to Azure Data Architect
2. Chapter 1: Introduction to Data Architectures FREE CHAPTER 3. Chapter 2: Preparing for Cloud Adoption 4. Part 2: Data Engineering on Azure
5. Chapter 3: Ingesting Data into the Cloud 6. Chapter 4: Transforming Data on Azure 7. Chapter 5: Storing Data for Consumption 8. Part 3: Data Warehousing and Analytics
9. Chapter 6: Data Warehousing 10. Chapter 7: The Semantic Layer 11. Chapter 8: Visualizing Data Using Power BI 12. Chapter 9: Advanced Analytics Using AI 13. Part 4: Data Security, Governance, and Compliance
14. Chapter 10: Enterprise-Level Data Governance and Compliance 15. Chapter 11: Introduction to Data Security 16. Index 17. Other Books You May Enjoy

Network security

Much like IAM, networking and network security are huge domains. The exact network security configurations are often best kept for experts in the field, but it is still valuable for a cloud data architect to grasp the principles of securing networks.

The PoLP in access management stated that any identity should have the least amount of access to complete the job. Similar to this, in network security, endpoints should have the least possible exposure.

First, this comes down to not blindly opening up all endpoints to the public internet. This is, however, the default option in many Azure services. It is possible to deny public network access on the resource level, or we could enforce any resource of a given type to have disabled public network access by using Azure Policy. Azure Policy is further explained at the end of this chapter.

By disabling all access from the public network, the resources can only be accessed through private endpoints. This prevents...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €18.99/month. Cancel anytime