官术网_书友最值得收藏!

Summary

In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.

Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.

In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.

主站蜘蛛池模板: 交口县| 太湖县| 民县| 遵义县| 田阳县| 大化| 普格县| 徐闻县| 道孚县| 石河子市| 谢通门县| 沾益县| 新津县| 锦州市| 尼勒克县| 垫江县| 拜泉县| 鸡东县| 炉霍县| 涟水县| 景东| 旬邑县| 昌邑市| 阳高县| 珠海市| 疏附县| 双鸭山市| 伽师县| 盐源县| 二连浩特市| 格尔木市| 门源| 南宫市| 太仓市| 莲花县| 万源市| 鲜城| 民和| 潼关县| 广汉市| 东莞市|