- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 189字
- 2021-06-30 15:08:16
Summary
In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.
Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.
In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.
- 網(wǎng)絡安全與管理
- 大型互聯(lián)網(wǎng)企業(yè)安全架構
- 計算機使用安全與防護
- 安全實戰(zhàn)之滲透測試
- 云原生安全技術實踐指南
- Kerberos域網(wǎng)絡安全從入門到精通
- 安全防御入門手冊
- Web安全之深度學習實戰(zhàn)
- Learn Azure Sentinel
- Kali Linux無線網(wǎng)絡滲透測試詳解
- Hands-On Bug Hunting for Penetration Testers
- Developing Applications with Salesforce Chatter
- 網(wǎng)絡對抗的前世今生
- 網(wǎng)絡空間安全實踐能力分級培養(yǎng)(I)
- 大中型網(wǎng)絡入侵要案直擊與防御