You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security/security-white-papers.md
+4-7Lines changed: 4 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,15 +5,15 @@ services: azure-security
5
5
documentationcenter: na
6
6
author: TomShinder
7
7
manager: MBaldwin
8
-
editor:
8
+
editor:
9
9
10
10
ms.assetid:
11
11
ms.service: security
12
12
ms.devlang: na
13
13
ms.topic: article
14
14
ms.tgt_pltfrm: na
15
15
ms.workload: na
16
-
ms.date: 3/19/2018
16
+
ms.date: 8/17/2018
17
17
ms.author: tomsh
18
18
19
19
---
@@ -24,8 +24,8 @@ ms.author: tomsh
24
24
|[Advanced threat detection](azure-threat-detection.md)|Guides you through the Azure approaches towards threat vulnerability assessments, diagnostics, and analysis. Explains how Microsoft uses advanced threat detection mechanisms to secure the platform. Also explains how Microsoft includes these mechanisms in public facing features and services.|
25
25
|[Azure data encryption-at-rest](azure-security-encryption-atrest.md)|Focuses on how data is protected at rest across Azure and the various components taking part in the data protection implementation. Reviews the pros and cons of the different key management protection approaches.|
26
26
|[Azure logging and auditing](azure-log-audit.md)|Provides an introduction for generating, collecting, and analyzing security logs from services hosted on Azure. These logs can help you gain security insights into your Azure deployments. |
27
-
|[Azure network security](azure-network-security.md)|Introduces you to the wide range of network controls you can configure to enhance the security of the solutions you deploy in Azure. The focus is customer-facing network security controls.|
28
-
|[Azure Functions and serverless platform security](https://gallery.technet.microsoft.com/Azure-Functions-and-c6449f8d/file/202175/1/Microsoft%20Serverless%20Platform.pdf)|This downloadable white paper covers the benefits of serverless computing while providing security considerations and mitigations in the context of Azure. |
27
+
|[Azure network security](abstract-azure-network-security.md)|Introduces you to the wide range of network controls you can configure to enhance the security of the solutions you deploy in Azure. The focus is customer-facing network security controls.|
28
+
|[Azure Functions and serverless platform security](https://gallery.technet.microsoft.com/Azure-Functions-and-c6449f8d/file/202175/1/Microsoft%20Serverless%20Platform.pdf)|This downloadable white paper covers the benefits of serverless computing while providing security considerations and mitigations in the context of Azure. |
29
29
|[Azure operational security](azure-operational-security.md)|Provides a comprehensive look at the customer-facing operational security technologies and services available with Azure.|
30
30
|[Azure security technical capabilities](azure-security-technical-capabilities.md)|Focuses on the security features and functionality supporting Azure Storage, Azure SQL Databases, the Azure virtual machine model, and the tools and infrastructure that manage it all.|
31
31
|[Azure Storage security guide](https://docs.microsoft.com/azure/storage/common/storage-security-guide?toc=%2fazure%2fsecurity%2ftoc.json)|Provides an overview of each of the security features that can be used with Azure Storage. Covers management plane security, data plane security, encryption at rest, encryption in flight, and storage analytics.|
@@ -34,6 +34,3 @@ ms.author: tomsh
34
34
|[Isolation in the Azure public cloud](azure-isolation.md)|Outlines how Azure provides isolation against both malicious and non-malicious users. Serves as a guide for architecting cloud solutions by offering various isolation choices to architects. Primary focus is on the customer-facing security controls, and does not attempt to address SLAs, pricing models, and DevOps practice considerations.|
35
35
|[Overview of Azure compliance](https://gallery.technet.microsoft.com/Overview-of-Azure-c1be3942)|This downloadable paper discusses Azure compliance offerings, including formal certifications, attestations, validations, authorizations, and assessments produced by independent third-party auditing firms, as well as contractual amendments, self-assessments, and customer guidance documents produced by Microsoft. <br/> Each offering description states which Azure customer-facing services are in scope for the assessment, and provides links to downloadable resources to assist customers with their own compliance obligations.|
36
36
|[Security management in Azure](azure-security-management.md)|Discusses issues in the remote access of Azure resources. The nature of the cloud demands remote access administration and, therefore, security is paramount. Covers general security guidelines, client configuration, best practices, and operational principles and procedures. |
0 commit comments