AZ-900 Certification Notes

Chapter 10.10 - Summary

Security Summary

  • Defense in Depth

    • You need multiple layers of defense for your infrastructure. Azure has physical, identity, perimeter, network, compute, gateways and firewalls, and data as protection layers
  • Securing Network Connectivity

    • A firewall controls the data coming and out of a network based on rules. Azure protects against DDoS attacks with no downtime to you. A network security group protects a subnet or virtual machine
  • Public and Private Endpoints

    • Most Azure PaaS services are publicly reachable by default. Private endpoints enable private access to PaaS services. Can also disable public access for truly private services
  • Microsoft Defender for Cloud (formerly Azure Security Center)

    • Monitor security hygiene for VMs. Define policies to protect your resources better and respond to incidents
  • Azure Key Vault

    • A secure way to share access to applications and resources with third parties without ever revealing any credentials
  • Azure Information Protection

    • Share files and data inside and outside of Azure and still maintain control over that data. You can control who views, edits, prints, and more
  • Azure Sentinel

    • Collect, aggregate, analyze, and present security issues automatically for you to take action
  • Azure Dedicated Hosts

    • Your own dedicated Azure hardware to install Windows, Linux, or SQL Server VMs on. Gives you control without losing cloud benefits like scaling, scale sets, fault isolation, and availability zones
  • Microsoft Defender for Identity (formerly Advanced Threat Protection)

    • You secure and manage users of your organization. Monitor users' behavior, create a baseline of this behavior, and report on any anomalies from it