Summary
With more organizations moving workloads to Microsoft Azure, it is vital that we have a solid understanding of the different services and mechanisms available to us to ensure that we have a secure foundation.
In this chapter, we took a closer look at how to design an Azure-based environment and some of the core components that should be in place to ensure that we have control of the virtual machine resources that are provisioned there.
We learned about some of the core services, such as Azure Policy, Azure Update Management, and Azure Backup, and how they can be used to safeguard our virtual infrastructure in Azure.
In the next chapter, we will take a closer look at how we can provide users with secure access to applications and services while ensuring that we are following zero-trust principles and how we can integrate risk and threat information into access management.
Lastly, we will look at different mechanisms that can help us protect traffic flow from various...