From the course: Microsoft Azure Security Technology (AZ-500) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,200 courses taught by industry experts.
Create, assign, and interpret security policies and initiatives in Azure Policy - Azure Tutorial
From the course: Microsoft Azure Security Technology (AZ-500) Cert Prep by Microsoft Press
Create, assign, and interpret security policies and initiatives in Azure Policy
- [Instructor] Recall that Azure policy is a fairly universal service in terms of going not only through Azure, but through other clouds in your on-premises environment, to evaluate resources for compliance through JSON-based policies, and many of these compliance-related and security-related Azure policies fit squarely in our wheelhouse as Azure Security Engineers. So, we definitely need to understand Azure policy, and the fact that we can start with a built-in, as the Microsoft Product Team calls them internally, clone it, and then you can build out your own custom Azure policies, you'll probably have multiple related policies. You can bundle those together into an initiative, and then enforce that compliance. So many policy effects. It's a great subject. It's a reminder here that Azure policy is one of the governance tools that operates with inheritance through the different Azure Resource Manager scopes, and Azure policy integrates, as do all of the Azure Resource Manager services…
Contents
-
-
-
-
-
-
-
-
-
-
-
-
-
(Locked)
Learning objectives37s
-
(Locked)
Create, assign, and interpret security policies and initiatives in Azure Policy2m 9s
-
(Locked)
Configure security settings using Azure Blueprints1m 57s
-
(Locked)
Deploy secure infrastructures using a landing zone1m 34s
-
(Locked)
Create and configure an Azure Key Vault1m 7s
-
(Locked)
Recommend when to use a dedicated hardware security module (HSM)2m 7s
-
(Locked)
Configure access to Key Vault, including vault access policies and Azure role-based access control1m 26s
-
(Locked)
Manage certificates, secrets, and keys1m
-
(Locked)
Configure key rotation1m 32s
-
(Locked)
Configure backup and recovery of certificates, secrets, and keys20m 22s
-
(Locked)
-
-
-