|
1. Managing identity and access
- Azure Active Directory Structure
- Securing Azure identities
- Enterprise governance policies
- Azure AD privileged identities
- Hybrid identity
|
|
2. Implementing platform protection
- Perimeter security
- Network security
- Host security
- Container security
- Azure container security for deployment considering images, credentials, logs and core
- Azure virtual machines with highest protection measures and reinforced security
|
|
3. Securing data and applications
- Azure storage security
- Securing databases in Azure SQL Database
- Securing applications encapsulated within our Azure environment
- Azure environment storage security
|
|
4. Managing security operations
- Telemetry data from Azure and on-premises environments
- Integrated security monitoring and policy management across your Azure subscription, helping to detect threats that might otherwise go undetected
- Security Information Events (SIEM) and Security Orchestration Automated Response (SOAR) provided by Microsoft through Azure Sentinel
|