Hardening Azure Applications


Book Description

Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses Scale Sets (VMSS), a major upgrade that enables autoscaling and seamlessly makes machines ready for high availability. The authors take you step by step through the process of evaluating and building applications with the appropriate hardness attributes. After a small introduction to cloud computing, you will learn about various cloud and hardened cloud applications in detail. Next, you will discover service fundamentals such as instrumentation, telemetry, and monitoring followed by key application experiences. Further, you will cover availability and the economics of 9s. Towards the end, you will see how to secure your application and learn about the modernization of software organisations, a new topic in this edition. After reading this book, you will master the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. What You Will Learn Use techniques and principles to harden Azure/.NET applications Secure your applications on Azure Create a scale set on Azure Work with service fundamentals such as instrumentation, telemetry, and monitoring Who This Book Is For Developers and IT professionals who are working on Azure applications.




Hardening Azure Applications


Book Description

Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be built and deployed in hours to mega-scale apps that need significantly higher engineering rigor and robust organizations to deliver them. How do you build such massively scalable applications to keep pace with traffic demands while always being ‘online’ with five 9's availability? The authors take you step by step through the process of evaluating and building applications with the appropriate hardness attributes. For example, it is easy to say that an application should be available "all the time", but it is very important to understand what each level of 9 for availability means and the resulting implications on engineering and resources. The book explains the details required for developers and IT Pros to get it right in Azure.




Hardening Azure Applications


Book Description

Learn what it takes to build large scale, mission critical applications -hardened applications- on the Azure cloud platform. This 208 page book covers the techniques and engineering principles that every architect and developer needs to know to harden their Azure/.NET applications to ensure maximum reliability and high availability when deployed at scale. While the techniques are implemented in .NET and optimized for Azure, the principles here will also be valuable for users of other cloud-based development platforms. Applications come in a variety of forms, from simple apps that can be built and deployed in hours to mega-scale apps that need significantly higher engineering rigor and robust organizations to deliver them. How do you build such massively scalable applications to keep pace with traffic demands while always being 'online' with five 9's availability? The authors take you step by step through the process of evaluating and building applications with the appropriate hardness attributes. For example, it is easy to say that an application should be available "all the time", but it is very important to understand what each level of 9 for availability means and the resulting implications on engineering and resources. The book explains the details required for developers and IT Pros to get it right in Azure.




Hardening Azure Applications


Book Description

Including case studies of major cloud service failures, this step-by-step guide will teach you the tips, tricks and secrets of hardened Azure application development from authors who have personally developed and deployed massively scalable systems. --




Security Strategies in Windows Platforms and Applications


Book Description

Revised and updated to keep pace with this ever-changing field, Security Strategies in Windows Platforms and Applications, Fourth Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular emphasis on Windows 11, and Windows Server 2022. The Fourth Edition highlights how to use tools and techniques to decrease risks arising from vulnerabilities in Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style, and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security strategies and techniques.




Mastering Azure Security


Book Description

Mastering Azure Security enables you to implement top-level security in your Azure tenant. With a focus on cloud security, this book will look at the architectural approach on how to design your Azure solutions to keep and enforce resources secure.




Mastering Windows Security and Hardening


Book Description

A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threats Key Features Learn to protect your Windows environment using zero-trust and a multi-layered security approach Implement security controls using Intune, Configuration Manager, Defender for Endpoint, and more Understand how to onboard modern cyber-threat defense solutions for Windows clients Book DescriptionAre you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies. The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you’ll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you’ll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing. By the end of this book, you’ll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.What you will learn Build a multi-layered security approach using zero-trust concepts Explore best practices to implement security baselines successfully Get to grips with virtualization and networking to harden your devices Discover the importance of identity and access management Explore Windows device administration and remote management Become an expert in hardening your Windows infrastructure Audit, assess, and test to ensure controls are successfully applied and enforced Monitor and report activities to stay on top of vulnerabilities Who this book is for If you're a cybersecurity or technology professional, solutions architect, systems engineer, systems administrator, or anyone interested in learning how to secure the latest Windows-based systems, this book is for you. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.




Microsoft Azure Security Center


Book Description

Discover high-value Azure security insights, tips, and operational optimizations This book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder show how to apply Azure Security Center’s full spectrum of features and capabilities to address protection, detection, and response in key operational scenarios. You’ll learn how to secure any Azure workload, and optimize virtually all facets of modern security, from policies and identity to incident response and risk management. Whatever your role in Azure security, you’ll learn how to save hours, days, or even weeks by solving problems in most efficient, reliable ways possible. Two of Microsoft’s leading cloud security experts show how to: • Assess the impact of cloud and hybrid environments on security, compliance, operations, data protection, and risk management • Master a new security paradigm for a world without traditional perimeters • Gain visibility and control to secure compute, network, storage, and application workloads • Incorporate Azure Security Center into your security operations center • Integrate Azure Security Center with Azure AD Identity Protection Center and third-party solutions • Adapt Azure Security Center’s built-in policies and definitions for your organization • Perform security assessments and implement Azure Security Center recommendations • Use incident response features to detect, investigate, and address threats • Create high-fidelity fusion alerts to focus attention on your most urgent security issues • Implement application whitelisting and just-in-time VM access • Monitor user behavior and access, and investigate compromised or misused credentials • Customize and perform operating system security baseline assessments • Leverage integrated threat intelligence to identify known bad actors




Exam Ref AZ-500 Microsoft Azure Security Technologies


Book Description

Prepare for Microsoft Exam AZ-500 and demonstrate your real-world knowledge of Microsoft Azure security, including the skills needed to implement security controls, maintain an organization’s security posture, and identify and remediate security vulnerabilities. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Secure networking Secure compute, storage, and databases Manage security operations This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have experience in administration of Microsoft Azure and hybrid environments, and familiarity with compute, network, and storage in Azure and Microsoft Entra ID About the Exam Exam AZ-500 focuses on knowledge needed to manage Microsoft Entra identities, authentication, authorization, and application access; plan and implement security for virtual networks, as well as for private and public access to Azure resources; plan and implement advanced security for compute, storage, Azure SQL Database, and Azure SQL managed instance; plan, implement, and manage governance for security, manage security posture and configure and manage threat protection using Microsoft Defender for Cloud, and configure and manage security monitoring and automation solutions. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of managing an organization’s security posture, identifying, and remediating vulnerabilities, performing threat modeling, implementing threat protection, responding to security incident escalations, and participating in the planning and implementation of cloud-based management and security. See full details at: microsoft.com/learn




Active Directory Administration Cookbook


Book Description

Simplified actionable recipes for managing Active Directory and Azure AD, as well as Azure AD Connect, for administration on-premise and in the cloud with Windows Server 2022 Key Features • Expert solutions for name resolution, federation, certificates, and security with Active Directory • Explore Microsoft Azure AD and Azure AD Connect for effective administration on the cloud • Automate security tasks using Active Directory tools and PowerShell Book Description Updated to the Windows Server 2022, this second edition covers effective recipes for Active Directory administration that will help you leverage AD's capabilities for automating network, security, and access management tasks in the Windows infrastructure. Starting with a detailed focus on forests, domains, trusts, schemas, and partitions, this book will help you manage domain controllers, organizational units, and default containers. You'll then explore Active Directory sites management as well as identify and solve replication problems. As you progress, you'll work through recipes that show you how to manage your AD domains as well as user and group objects and computer accounts, expiring group memberships, and Group Managed Service Accounts (gMSAs) with PowerShell. Once you've covered DNS and certificates, you'll work with Group Policy and then focus on federation and security before advancing to Azure Active Directory and how to integrate on-premise Active Directory with Azure AD. Finally, you'll discover how Microsoft Azure AD Connect synchronization works and how to harden Azure AD. By the end of this AD book, you'll be able to make the most of Active Directory and Azure AD Connect. What you will learn • Manage the Recycle Bin, gMSAs, and fine-grained password policies • Work with Active Directory from both the graphical user interface (GUI) and command line • Use Windows PowerShell to automate tasks • Create and remove forests, domains, domain controllers, and trusts • Create groups, modify group scope and type, and manage memberships • Delegate, view, and modify permissions • Set up, manage, and optionally decommission certificate authorities • Optimize Active Directory and Azure AD for security Who this book is for This book is for administrators of existing Active Directory Domain Service environments as well as for Azure AD tenants looking for guidance to optimize their day-to-day tasks. Basic networking and Windows Server Operating System knowledge will be useful for getting the most out of this book.