Secure your cloud applications in Azure
Offered By: Microsoft via Microsoft Learn
Course Description
Overview
- Module 1: Discover the tools that Azure provides to help you design a secure environment throughout your infrastructure, data, network, and applications.
- Develop a defense-in-depth approach to securing your architecture
- Choose the technologies to secure your Azure infrastructure
- Develop a strategy for secure identity management
- Module 2: Learn about the Site Reliability Engineering approach to the challenge of assuring reliability and gain a better understanding of why it matters.
- Use Microsoft Defender for Cloud
- Verify your application's inputs and outputs
- Store your secrets into Key Vault
- Ensure you are using the latest version of your framework, and its security features
- Validate that your program dependencies and libraries are safe to use
- Module 3: Create security baselines
- Learn Azure platform security baselines and how they were created
- Create and validate a security baseline for the most commonly used Azure services
- Module 4: Learn how to create an Azure Key Vault to store secret values and how to enable secure access to the vault.
- Explore what types of information can be stored in Azure Key Vault
- Create an Azure Key Vault and use it to store secret configuration values
- Enable secure access to the vault from an Azure App Service web app with managed identities for Azure resources
- Implement a web application that retrieves secrets from the vault
- Module 5: Discover how to protect your APIs from unauthorized use with API keys and client certificate authentication.
- Use API keys to secure your APIs
- Use client certificate authentication to secure your APIs
By the end of this module, you'll be able to:
In this module, you will:
In this module, you will:
In this module, you will:
In this module, you will:
Syllabus
- Module 1: Microsoft Azure Well-Architected Framework - Security
- Introduction
- Defense in depth
- Identity management
- Infrastructure protection
- Encryption
- Network security
- Application security
- Summary
- Module 2: Top 5 security items to consider before pushing to production
- Introduction
- Microsoft Defender for Cloud
- Inputs and Outputs
- Secrets in Key Vault
- Framework Updates
- Safe Dependencies
- Conclusion
- Module 3: Create security baselines
- Create a platform security baseline
- Understand the Azure platform security baseline
- Create an Identity & Access Management (IAM) baseline
- Create a Microsoft Defender for Cloud baseline
- Create an Azure storage accounts baseline
- Create an Azure SQL Database baseline
- Create a logging and monitoring baseline
- Create a Networking baseline
- Create an Azure VM baseline
- Other baseline security considerations
- Summary
- Module 4: Manage secrets in your server apps with Azure Key Vault
- Introduction
- What is Azure Key Vault?
- Exercise - Create a Key Vault and store secrets
- Vault authentication with managed identities for Azure resources
- Exercise - Access secrets stored in Azure Key Vault
- Exercise - Configure, deploy, and run your app in Azure
- Summary
- Module 5: Control authentication for your APIs with Azure API Management
- Introduction
- What is API Management?
- Create subscriptions in Azure API Management
- Exercise - Create subscriptions in Azure API Management
- Use client certificates to secure access to an API
- Exercise - Use client certificates to secure access to an API
- Summary
Tags
Related Courses
Architecting Microsoft Azure SolutionsMicrosoft via edX Internetwork Security
Indian Institute of Technology, Kharagpur via Swayam Network Security
Georgia Institute of Technology via Udacity Microsoft Professional Orientation : Cloud Administration
Microsoft via edX Cyber Threats and Attack Vectors
University of Colorado System via Coursera