Skip to content

Commit 93d7880

Browse files
authored
Merge pull request #49328 from TerryLanfear/doc-sec
Doc sec
2 parents 78abc04 + 730b029 commit 93d7880

File tree

1 file changed

+4
-7
lines changed

1 file changed

+4
-7
lines changed

articles/security/security-white-papers.md

Lines changed: 4 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,15 @@ services: azure-security
55
documentationcenter: na
66
author: TomShinder
77
manager: MBaldwin
8-
editor:
8+
editor:
99

1010
ms.assetid:
1111
ms.service: security
1212
ms.devlang: na
1313
ms.topic: article
1414
ms.tgt_pltfrm: na
1515
ms.workload: na
16-
ms.date: 3/19/2018
16+
ms.date: 8/17/2018
1717
ms.author: tomsh
1818

1919
---
@@ -24,8 +24,8 @@ ms.author: tomsh
2424
|[Advanced threat detection](azure-threat-detection.md)|Guides you through the Azure approaches towards threat vulnerability assessments, diagnostics, and analysis. Explains how Microsoft uses advanced threat detection mechanisms to secure the platform. Also explains how Microsoft includes these mechanisms in public facing features and services.|
2525
|[Azure data encryption-at-rest](azure-security-encryption-atrest.md)|Focuses on how data is protected at rest across Azure and the various components taking part in the data protection implementation. Reviews the pros and cons of the different key management protection approaches.|
2626
|[Azure logging and auditing](azure-log-audit.md)|Provides an introduction for generating, collecting, and analyzing security logs from services hosted on Azure. These logs can help you gain security insights into your Azure deployments. |
27-
|[Azure network security](azure-network-security.md)|Introduces you to the wide range of network controls you can configure to enhance the security of the solutions you deploy in Azure. The focus is customer-facing network security controls.|
28-
|[Azure Functions and serverless platform security](https://gallery.technet.microsoft.com/Azure-Functions-and-c6449f8d/file/202175/1/Microsoft%20Serverless%20Platform.pdf)|This downloadable white paper covers the benefits of serverless computing while providing security considerations and mitigations in the context of Azure. |
27+
|[Azure network security](abstract-azure-network-security.md)|Introduces you to the wide range of network controls you can configure to enhance the security of the solutions you deploy in Azure. The focus is customer-facing network security controls.|
28+
|[Azure Functions and serverless platform security](https://gallery.technet.microsoft.com/Azure-Functions-and-c6449f8d/file/202175/1/Microsoft%20Serverless%20Platform.pdf)|This downloadable white paper covers the benefits of serverless computing while providing security considerations and mitigations in the context of Azure. |
2929
|[Azure operational security](azure-operational-security.md)|Provides a comprehensive look at the customer-facing operational security technologies and services available with Azure.|
3030
|[Azure security technical capabilities](azure-security-technical-capabilities.md)|Focuses on the security features and functionality supporting Azure Storage, Azure SQL Databases, the Azure virtual machine model, and the tools and infrastructure that manage it all.|
3131
|[Azure Storage security guide](https://docs.microsoft.com/azure/storage/common/storage-security-guide?toc=%2fazure%2fsecurity%2ftoc.json) |Provides an overview of each of the security features that can be used with Azure Storage. Covers management plane security, data plane security, encryption at rest, encryption in flight, and storage analytics.|
@@ -34,6 +34,3 @@ ms.author: tomsh
3434
|[Isolation in the Azure public cloud](azure-isolation.md)|Outlines how Azure provides isolation against both malicious and non-malicious users. Serves as a guide for architecting cloud solutions by offering various isolation choices to architects. Primary focus is on the customer-facing security controls, and does not attempt to address SLAs, pricing models, and DevOps practice considerations.|
3535
|[Overview of Azure compliance](https://gallery.technet.microsoft.com/Overview-of-Azure-c1be3942)|This downloadable paper discusses Azure compliance offerings, including formal certifications, attestations, validations, authorizations, and assessments produced by independent third-party auditing firms, as well as contractual amendments, self-assessments, and customer guidance documents produced by Microsoft. <br/> Each offering description states which Azure customer-facing services are in scope for the assessment, and provides links to downloadable resources to assist customers with their own compliance obligations.|
3636
|[Security management in Azure](azure-security-management.md)|Discusses issues in the remote access of Azure resources. The nature of the cloud demands remote access administration and, therefore, security is paramount. Covers general security guidelines, client configuration, best practices, and operational principles and procedures. |
37-
38-
39-

0 commit comments

Comments
 (0)