Summary
Microsoft Azure offers a wide variety of SaaS, PaaS, and IaaS applications and services. Your organization will choose which Azure components you use according to your specific business needs.
Microsoft also provides a variety of security controls so that Azure instances can have effective cybersecurity. That includes protecting IAM through Active Directory, preventing exposed services, and protecting highly sensitive cryptographic keys and other kinds of authentication data and components.
Several third parties develop open source Azure pentesting and vulnerability scanning tools that you’ll use as a pentester. Using those tools is an effective way of finding vulnerabilities in Azure environments while avoiding activities that violate Microsoft’s pentesting policies.
In the next chapter, we’ll deploy our own Azure network and run some pentests in it.