Section 2: Implement Azure Platform Protection
The Azure cloud platform offers multiple options to organizations for hosting their workloads, including virtual machines and containers in both private and public networks. This section will cover how to secure your workloads in the cloud, from the perimeter (the outer boundary between the untrusted public internet and your workloads) to the actual services that host our applications. We will walk through many hands-on scenarios, including the implementation of DDoS protection, Web Application Firewall, Disk Encryption, just-in-time virtual machine access, Kubernetes RBAC with Azure Active Directory, and more. By the end of this section, you will have a solid understanding of how to secure your cloud workloads using a multi-layered approach.
This part of the book comprises the following chapters:
- Chapter 6, Implementing Perimeter Security
- Chapter 7, Implementing Network Security
- Chapter 8, Implementing Host Security...