Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Hands-On Cloud Administration in Azure

You're reading from   Hands-On Cloud Administration in Azure Implement, monitor, and manage important Azure services and components including IaaS and PaaS

Arrow left icon
Product type Paperback
Published in Oct 2018
Publisher Packt
ISBN-13 9781789134964
Length 390 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Mustafa Toroman Mustafa Toroman
Author Profile Icon Mustafa Toroman
Mustafa Toroman
Arrow right icon
View More author details
Toc

Table of Contents (13) Chapters Close

Preface 1. Key Concepts of Cloud Computing FREE CHAPTER 2. Azure Networking - Foundation of Azure IaaS 3. Infrastructure as a Service - the First Layer of Cloud Computing 4. Azure App Service - Hosting Web Applications without a Server 5. The Azure Data Platform 6. Azure Storage, Backup, and Site Recovery - Moving your Data to Azure 7. Hybrid Cloud with Azure - Extending Local Workloads to the Cloud 8. Azure Active Directory - Identity in the Cloud 9. Azure Security and Administration 10. Best Practices 11. Assessments 12. Other Books You May Enjoy

Encryption

Another important step in security is encryption. We want our data to be encrypted always—in rest and transit. Everything is redundant to ensure there is no data is lost, and even with three copies of that, all of them encrypted, we have the option to create additional redundancy with geo-replication and other settings.

All resources in Azure are encrypted at rest by default. But sometimes we need additional security to ensure data is more protected. For example, disks for our Azure VMs are encrypted inside the Azure data center, and even if the disk was accessed without authorization, no one could read data on that disk. But what if the disk was downloaded? In this case, the disk could be used. Data could be read or attached to another VM, or a VM could be created with that disk.

We can apply additional encryption and make our resources more secure by using...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image