- Mastering Windows Security and Hardening
- Mark Dunkerley Matt Tumbarello
- 275字
- 2021-06-18 18:38:00
Chapter 3: Server Infrastructure Management
The data center is constantly evolving and services traditionally used by hosting servers in physical data centers are now virtualized and using serverless computing models in the cloud. No matter how your infrastructure is deployed or what infrastructure is used, each presents a unique security challenge for an organization. In this chapter, we will provide an overview of the data center and cloud models as they exist today. We will discuss security access strategies for Windows servers as they are relevant to all infrastructure models to ensure not just anyone can access Windows without going through the proper access controls. You will learn about the available management tools used for on-premises, hybrid, and cloud deployments, as well as how to leverage Azure services to expand your data center reach to the cloud. Then, we will provide an overview of the Azure services that are used to manage Windows servers, including the Azure portal and Azure Resource Manager. It's important to understand the existence of these tools and services so that you have a high-level understanding of each when building out your security program. Depending on the size of your organization, services such as these may require several teams to control access, including physical security, a security operations center (SOC), and identity and access management teams. All of these play a vital role in ensuring your Windows systems are properly managed and protected.
In this chapter, we will cover the following topics:
- Overview of the data center and the cloud (IaaS, PaaS, SaaS)
- Implementing access management in Windows servers
- Understanding Windows Server management tools
- Using Azure services to manage Windows servers
- Node Security
- Web漏洞分析與防范實(shí)戰(zhàn):卷1
- 黑客大曝光:無線網(wǎng)絡(luò)安全(原書第3版)
- CSO進(jìn)階之路:從安全工程師到首席安全官
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- 數(shù)字化轉(zhuǎn)型浪潮下的數(shù)據(jù)安全最佳實(shí)踐指南
- Spring Security(Third Edition)
- ARM匯編與逆向工程:藍(lán)狐卷·基礎(chǔ)知識(shí)
- Building a Home Security System with BeagleBone
- 計(jì)算機(jī)網(wǎng)絡(luò)安全基礎(chǔ)(第5版)
- Instant Java Password and Authentication Security
- 白話零信任
- CPK通向賽博安全之路:理論與實(shí)踐CPK Solution to Cyber Security:Theory and Practice
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐
- 數(shù)據(jù)安全實(shí)踐:能力體系、產(chǎn)品實(shí)現(xiàn)與解決方案