官术网_书友最值得收藏!

Summary

In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.

Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.

In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.

主站蜘蛛池模板: 英吉沙县| 江北区| 堆龙德庆县| 雷州市| 富川| 双鸭山市| 宁晋县| 浦北县| 常宁市| 九江市| 科技| 牙克石市| 纳雍县| 庄河市| 吐鲁番市| 石棉县| 长白| 福贡县| 绥滨县| 澄迈县| 承德市| 同德县| 湟中县| 仁化县| 长岛县| 新巴尔虎右旗| 仙居县| 新乐市| 隆安县| 吴桥县| 五指山市| 娄烦县| 金乡县| 襄汾县| 兖州市| 项城市| 黔南| 新沂市| 榆林市| 井研县| 崇仁县|