Chapter 1: Introduction: Dimensions of cloud security
History about security and public cloudCloud security boundaries and responsibilitiesPattern-based securityAzure's defence-in-depth security architecture30 pages
Chapter 2: Identity and Access Management with Azure Active DirectoryIdentity protocols and application typesAzure active directory security modelActive directory federation servicesAzure AD Application proxyExploring Azure AD B2B and B2C for external partnersPIM Azure AD Identity protection hybrid implementationSingle sign on with Azure AD60 pages
Chapter 3: Network Security PatternsSoftware defined networksNetwork topologiesSegmenting subnetsControlling routing behaviourUsing gateways and firewalls30 pages
Chapter 4: Infrastructure Security PatternsPhysical securityBuilt in Azure security controlsAzure tenant securityContainer securitySecuring Azure resources30 pages
Chapter 5: Application and Data Security PatternsSecuring the application accessData classificationSecuring the data accessData encryption patterns30 pages
Chapter 6: Security ProcessesComplete mediation with threat modellingSecuring the infrastructure and application deploymentSecurity testingKey Management - Vulnerability managementDisaster recovery40 pages
Chapter 7: Automated Security MonitoringSetting up security policiesAdvanced observabilityAzure MonitorAzure Sentinel30 pages
Chapter 8: Creating a Security CultureLeadership supportTraining10 pages