Designing & Developing Secure Azure Solutions, 1st edition

Published by Microsoft Press (December 5, 2022) © 2023

  • Michael Howard
  • Simone Curzi
  • Heinrich Gantenbein

VitalSource eTextbook

ISBN-13: 9780137908684
Designing and Developing Secure Azure Solutions
Published 2022
  • Available for purchase from all major ebook resellers, including InformIT.com

Paperback

ISBN-13: 9780137908752
Designing and Developing Secure Azure Solutions
Published 2022

Details

  • A print text
  • Free shipping
  • Also available for purchase as an ebook from all major ebook resellers, including InformIT.com

This product is expected to ship within 3-6 business days for US and 5-10 business days for Canadian customers.

As more and more applications and workloads move to the Microsoft Azure cloud, safeguarding them isn't just business-critical, it's existential. To deliver Azure solutions that stand up against unprecedented threats, you must build robust security into your designs, use proven security best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. In Designing & Developing Secure Azure Solutions, a team of leading Azure security experts show how to do just that. Drawing on extensive experience securing Azure workloads of all types and sizes, the authors present both a practical tutorial for addressing immediate challenges, and a definitive design reference you can rely on far into the future. You'll learn how to integrate multiple Azure security technologies at both application and network layers, to make the most of all the platform offers—from design and development to testing, deployment, governance, and compliance.

PART I SECURITY PRINCIPLES

CHAPTER 1 Secure development lifecycle processes

CHAPTER 2 Secure design

CHAPTER 3 Security patterns

CHAPTER 4 Threat modeling

CHAPTER 5 Identity, authentication, and authorization

CHAPTER 6 Monitoring and auditing

CHAPTER 7 Governance

CHAPTER 8 Compliance and risk programs

 

PART II SECURE IMPLEMENTATION

CHAPTER 9 Secure coding

CHAPTER 10 Cryptography in Azure

CHAPTER 11 Confidential computing

CHAPTER 12 Container security

CHAPTER 13 Database security

CHAPTER 14 CI/CD security

CHAPTER 15 Network security

Appendix A: Core cryptographic techniques

Need help? Get in touch