Building a Secure Foundation
In the previous chapter, we took a closer look at what ransomware is, how it works, what attack vectors are, and how some of the different ransomware groups operate. In this chapter, we will start by exploring what a secure foundation should look like from an architectural perspective; we will also explore some of the common best practices in terms of networking design, identity access, and publishing external services.
This chapter will focus more on the high-level design and different security best practices, which we will then go on to elaborate upon in later chapters when we implement the different features mentioned in this chapter. Lastly, we will be looking closely at some of the key components of building a security monitoring platform.
We will also take a closer look at building a new secure foundation in Microsoft Azure using Microsoft reference architectures and how they can secure your services and data.
While most ransomware attacks...