- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 189字
- 2021-06-30 15:08:16
Summary
In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.
Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.
In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.
- Learning Python for Forensics
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 暗戰亮劍:黑客滲透與防御全程實錄
- 黑客攻防入門秘笈
- 計算機病毒分析與防范大全(第3版)
- Getting Started with FortiGate
- Mastering Kali Linux for Advanced Penetration Testing
- 代碼審計:企業級Web代碼安全架構
- Kali Linux Wireless Penetration Testing Cookbook
- CTF競賽權威指南(Pwn篇)
- 華為防火墻實戰指南
- CTF特訓營:技術詳解、解題方法與競賽技巧
- 隱私計算:推進數據“可用不可見”的關鍵技術
- 網絡空間安全:拒絕服務攻擊檢測與防御
- 隱私保護機器學習