Microsoft Azure Security Technologies (AZ-500)

Host Security

Introduction

Welcome to our comprehensive guide on host security. In this article, we build on our previous discussions covering identity and access, perimeter security, and network security as part of a robust defense-in-depth strategy. Now, we shift our focus to compute security.

The image illustrates a "Defense in Depth" strategy using concentric layers, each representing different security measures such as physical security, identity and access, perimeter, network, compute, application, and data. Each layer is associated with specific security tools or practices like DDoS, Azure Firewall, and Microsoft Defender for Cloud.

Within compute security, there are two primary areas:

  • Host Security: Pertains to Infrastructure as a Service (IaaS) solutions.
  • Container Security: Relevant when using Azure Kubernetes Service (AKS), container apps, or container instances. For more details on AKS, refer to the Azure Kubernetes Service documentation.

In this guide, we focus initially on host security and subsequently discuss container security to ensure a thorough understanding of compute security.

Topics Covered

This module presents a comprehensive overview of host security best practices, including:

  • Endpoint protection
  • Privileged access device strategy
  • Privileged access workstations (PAW)
  • Virtual machine templates
  • Secure remote access management using Azure Bastion
  • Update management configuration
  • Disk encryption deployment
  • Microsoft Defender for Cloud deployment and configuration (formerly known as Security Center)
  • Securing Azure workloads using the Azure Security Benchmark

The image lists various host security tasks with corresponding icons, such as enabling endpoint protection, deploying disk encryption, and configuring Windows Defender.

Note

This guide is designed for IT professionals and security administrators seeking to enhance their understanding of host security within Azure environments.

We begin our deep dive into host security with the first topic: enabling endpoint protection. Continue reading to explore expert strategies and best practices to fortify your infrastructure against evolving threats.

Watch Video

Watch video content

Previous
ExpressRoute