SKIP THE SHIPPING
Use code NOSHIP during checkout to save 40% on eligible eBooks, now through January 5. Shop now.
This eBook includes the following formats, accessible from your Account page after purchase:
EPUB The open industry format known for its reflowable content and usability on supported mobile devices.
PDF The popular standard, used most often with the free Acrobat® Reader® software.
This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.
Also available in other formats.
Register your product to gain access to bonus material or receive a coupon.
Plan, build, and maintain highly secure Azure applications and workloads
As business-critical applications and workloads move to the Microsoft Azure cloud, they must stand up against dangerous new threats. That means you must build robust security into your designs, use proven best practices across the entire development lifecycle, and combine multiple Azure services to optimize security. Now, a team of leading Azure security experts shows how to do just that. Drawing on extensive experience securing Azure workloads, the authors present a practical tutorial for addressing immediate security challenges, and a definitive design reference to rely on for years. Learn how to make the most of the platform by integrating multiple Azure security technologies at the application and network layers taking you from design and development to testing, deployment, governance, and compliance.
About You
This book is for all Azure application designers, architects, developers, development managers, testers, and everyone who wants to make sure their cloud designs and code are as secure as possible.
Discover powerful new ways to:
Download the sample pages (includes Chapter 3)
PART I SECURITY PRINCIPLES
CHAPTER 1 Secure development lifecycle processes
CHAPTER 2 Secure design
CHAPTER 3 Security patterns
CHAPTER 4 Threat modeling
CHAPTER 5 Identity, authentication, and authorization
CHAPTER 6 Monitoring and auditing
CHAPTER 7 Governance
CHAPTER 8 Compliance and risk programs
PART II SECURE IMPLEMENTATION
CHAPTER 9 Secure coding
CHAPTER 10 Cryptography in Azure
CHAPTER 11 Confidential computing
CHAPTER 12 Container security
CHAPTER 13 Database security
CHAPTER 14 CI/CD security
CHAPTER 15 Network security
Appendix A: Core cryptographic techniques