Security documentation
Apply security principles to your architecture to protect against attacks on your data and systems.
Design for security
Get Started
- Plan segmentation
- Consider team roles and responsibilities
- Implement network segmentation
- Encrypt data
- Understand application security
Concept
- Support segmentation with management groups
- Identity management and access control best practices
- Network best practices
- Encryption best practices
- Analyze application threats
- Gather compliance requirements
- Secure application configuration and dependencies
Training
What's new
Secure build and deploy
Overview
Concept
- Minimize access
- Understand Infrastructure as Code (IaC)
- Roll back and roll forward
- Scanning credentials
video
Security monitoring
Overview
- Security monitoring tools in Azure
- Security operations in Azure
- Validate and test security design
- Review and audit security posture
- Check for identity, network, and data risks
Concept
- Prevent, detect, and respond to threats
- Security operations best practices
- Penetration testing (pentesting)
- Review critical access
- Review identity risks