Udayakumar Design and Deploy a Secure Azure Environment
1. Auflage 2023
ISBN: 978-1-4842-9678-3
Verlag: APRESS
Format: PDF
Kopierschutz: 1 - PDF Watermark
Mapping the NIST Cybersecurity Framework to Azure Services
E-Book, Englisch, 695 Seiten
Reihe: Professional and Applied Computing
ISBN: 978-1-4842-9678-3
Verlag: APRESS
Format: PDF
Kopierschutz: 1 - PDF Watermark
The book will take you through an introduction and the basic requirements for cloud security aligned with the NIST CSF. And then it will teach you how to design and deploy security for infrastructure, data, and apps security in an Azure enterprise environment. The book covers the NIST CSF and various cloud services offered by Microsoft Azure, maps each service against the NIST CSF, and explains each section with design and deployment considerations from a cybersecurity viewpoint.
After reading this book, you will understandNIST CSF alignment with Microsoft Azure Services. You will also have a comprehensive understanding of Azure security and be equipped with the knowledge and skills to design, deploy, and manage secure Azure environments. Whether you are a security professional, system administrator, or cloud architect, this book is a valuable resource for mastering Azure security and implementing robust security measures in the Azure environment using the NIST CSF.
What You Will Learn
- Design and deploy security for infrastructure, data, and applications
- Design and deploy an identify solution
- Design and deploy a protect solution
- Design and deploy a detect solution
- Design and deploy a respond solution
- Design and deploy a recover solution
Cyber system administrators and architects working with Microsoft Azure integrated services
Zielgruppe
Professional/practitioner
Autoren/Hrsg.
Weitere Infos & Material
Chapter 1:Getting Started with Azure Security.- Chapter 2: Design and Deploy Security for Infrastructure, Data, and Applications.- Chapter 3: Design and Deploy an Identify Solution.- Chapter 4: Design and Deploy a Protect Solution, Part I.- Chap7: Design and Deploy a Detect Solution.- Chapter 8: Design and Deploy a Respond Solution.- Chapter 9: Design and Deploy a Recover Solution.




