History about security and public cloud
Cloud security boundaries and responsibilities
Pattern-based security
Azure's defence-in-depth security architecture
30 pages
Chapter 2: Identity and Access Management with Azure Active Directory
Identity protocols and application types
Azure active directory security model
Active directory federation services
Azure AD Application proxy
Exploring Azure AD B2B and B2C for external partners
PIM Azure AD Identity protection hybrid implementation
Single sign on with Azure AD
60 pages
Chapter 3: Network Security Patterns
Software defined networks
Network topologies
Segmenting subnets
Controlling routing behaviour
Using gateways and firewalls
30 pages
Chapter 4: Infrastructure Security Patterns
Physical security
Built in Azure security controls
Azure tenant security
Container security
Securing Azure resources
30 pages
Chapter 5: Application and Data Security Patterns
Securing the application access
Data classification
Securing the data access
Data encryption patterns
30 pages
Chapter 6: Security Processes
Complete mediation with threat modelling
Securing the infrastructure and application deployment
Security testing
Key Management - Vulnerability management
Disaster recovery
40 pages
Chapter 7: Automated Security Monitoring
Setting up security policies
Advanced observability
Azure Monitor
Azure Sentinel
30 pages
Chapter 8: Creating a Security Culture
Leadership support
Training
10 pages