Summary
This chapter has provided us with comprehensive coverage of all of the components within Azure Stack Hub that are used for security. We started the chapter with a look at the security infrastructure that underpins Azure Stack Hub. We learned about the security vision for Azure Stack Hub as defined by Microsoft. We then walked through the two security postures for Azure Stack Hub.
We covered the hardened by default posture, which is built from the hardware upward. We saw how to reduce the software attack surface, which included things such as ACLs, BitLocker, and certificates. We learned how to use BitLocker to encrypt the storage and also how to rotate certificates. We talked about the assume breach posture and also covered a number of Microsoft security best practices.
We then discussed the benefits of a closed system before moving on to look at Azure Stack Hub compliance with internationally recognized standards such as PCI-DSS. Finally, we took a walk through SIEM...