Summary
In this chapter, we discussed how to design a security strategy for on-premises and cloud virtual machines, as well as other networked endpoints. You also learned how to create a secure access strategy and manage keys, secrets, and certificates with Azure Key Vault. This chapter concluded by providing an understanding of the processes, procedures, and people necessary for security operations, and how to evaluate the effectiveness of your security operations.
In the next chapter, you will learn how to design a strategy for securing SaaS, PaaS, and IaaS. This will include building a security baseline for each of these services while covering security requirements for containers, edge computing, application services, databases, and storage accounts within Azure.
Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration