1
1
# ## YamlMime:Hub
2
2
3
3
title : Azure security documentation
4
- summary : Security is integrated into every aspect of Azure. Azure offers you unique security advantages derived from global security intelligence, sophisticated customer-facing controls, and a secure hardened infrastructure. This powerful combination helps protect your applications and data, support your compliance efforts , and provide cost-effective security for organizations of all sizes .
4
+ summary : Azure offers security advantages that support your compliance efforts, provide cost-effective security for your organization, and help protect your hybrid and multi-cloud platforms, applications , and data .
5
5
brand : azure
6
6
7
7
metadata :
8
8
title : Azure security documentation
9
- description : Learn about security in Azure. See information about security fundamentals, best practices and patterns, and Microsoft Defender for Cloud .
9
+ description : Azure offers security advantages that support your compliance efforts, provide cost-effective security for your organization, and help protect your hybrid and multi-cloud platforms, applications, and data .
10
10
services : security
11
11
ms.service : security
12
12
ms.subservice : na
@@ -46,227 +46,38 @@ highlightedContent:
46
46
47
47
conceptualContent :
48
48
items :
49
- - title : Fundamentals
49
+ - title : " Modernize security operations: Learn the fundamentals of Azure security and how to defend against threats "
50
50
links :
51
- - url : ./fundamentals/overview.md
51
+ - url : ./fundamentals/overview.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
52
52
itemType : overview
53
53
text : Introduction to Azure security
54
- - url : https://gallery.technet.microsoft.com/Shared-Responsibilities-81d0ff91
54
+ - url : ./fundamentals/shared-responsibility.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
55
55
itemType : concept
56
56
text : Shared responsibilities for cloud computing
57
- - url : ./benchmarks/index.yml
57
+ - url : ./fundamentals/ransomware-protection.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
58
58
itemType : concept
59
- text : Security controls for Azure services
60
- footerLink :
61
- url : ./fundamentals/index.yml
62
- text : See more
59
+ text : Protect against ransomware
63
60
64
- - title : Developers
61
+ - title : " Data security & governance, risk, and compliance: If your organization needs to comply with legal or regulatory standards, learn about compliance in Azure "
65
62
links :
66
- - url : ./develop/secure-dev-overview.md
63
+ - url : https://docs.microsoft.com/learn/modules/m365-compliance-information-governance/
67
64
itemType : overview
68
- text : Secure development best practices
69
- - url : ./develop/secure-develop.md
70
- itemType : tutorial
71
- text : Develop secure applications
72
- - url : ./develop/threat-modeling-tool.md
73
- itemType : concept
74
- text : Microsoft Threat Modeling tool
75
- footerLink :
76
- url : ./develop/index.yml
77
- text : See more
78
-
79
- - title : Security best practices and patterns
80
- links :
81
- - url : ./fundamentals/identity-management-best-practices.md
82
- itemType : concept
83
- text : Identity management
84
- - url : ./fundamentals/network-best-practices.md
85
- itemType : concept
86
- text : Network security
87
- - url : ./fundamentals/paas-deployments.md
88
- itemType : concept
89
- text : Securing PaaS deployments
90
- footerLink :
91
- url : ./fundamentals/best-practices-and-patterns.md
92
- text : See more
93
-
94
- - title : Secrets and keys
95
- links :
96
- - url : ../key-vault/general/overview.md
97
- itemType : overview
98
- text : What is Azure Key Vault?
99
- - url : ../key-vault/secrets/quick-create-cli.md
100
- itemType : quickstart
101
- text : Set and retrieve a secret
102
- - url : ../dedicated-hsm/overview.md
103
- itemType : overview
104
- text : What is Azure Dedicated HSM?
105
- footerLink :
106
- url : ../key-vault/index.yml
107
- text : See more
108
-
109
- - title : Data protection
110
- links :
111
- - url : ./fundamentals/encryption-atrest.md
112
- itemType : concept
113
- text : Data Encryption-at-Rest
114
- - url : ./fundamentals/data-encryption-best-practices.md
115
- itemType : concept
116
- text : Data security and encryption best practices
117
- - url : ../storage/blobs/security-recommendations.md
118
- itemType : concept
119
- text : Storage security
120
- footerLink :
121
- url : ./fundamentals/encryption-overview.md
122
- text : See more
123
-
124
- - title : Identity management
125
- links :
126
- - url : ../active-directory/hybrid/choose-ad-authn.md
127
- itemType : concept
128
- text : Choose the right authentication method
129
- - url : ./fundamentals/steps-secure-identity.md
65
+ text : Introduction to information protection and governance in Microsoft 365
66
+ - url : ../governance/policy/overview.md
130
67
itemType : concept
131
- text : Securing your identity infrastructure
132
- - url : ./fundamentals/identity-management-best-practices.md
68
+ text : Azure Policy service
69
+ - url : https://docs.microsoft.com/microsoft-365/compliance/information-protection-solution?view=o365-worldwide
133
70
itemType : concept
134
- text : Security best practices
135
- footerLink :
136
- url : ./fundamentals/identity-management-overview.md
137
- text : See more
71
+ text : Deploy an information protection solution with Microsoft Purview
138
72
139
- - title : Security monitoring
73
+ - title : " Secure identities and access: Learn how identity and access management offers security assurances "
140
74
links :
141
- - url : ../security-center/security-center-get-started.md
142
- itemType : quickstart
143
- text : Onboard your subscription to Defender for Cloud
144
- - url : ../security-center/security-center-just-in-time.md
75
+ - url : https://docs.microsoft.com/security/zero-trust/deploy/identity
145
76
itemType : how-to-guide
146
- text : Just-in-time virtual machine access
147
- - url : ../security-center/tutorial-security-policy.md
148
- itemType : how-to-guide
149
- text : Working with security policies
150
- footerLink :
151
- url : ../security-center/index.yml
152
- text : See more
153
-
154
- - title : IoT security monitoring
155
- links :
156
- - url : ../defender-for-iot/overview.md
157
- itemType : overview
158
- text : Introducing Microsoft Defender for IoT
159
- - url : ../defender-for-iot/architecture.md
160
- itemType : how-to-guide
161
- text : Microsoft Defender for IoT architecture
162
- - url : ../defender-for-iot/getting-started.md
163
- itemType : how-to-guide
164
- text : Get started with Microsoft Defender for IoT
165
- footerLink :
166
- url : /azure/asc-for-iot/
167
- text : See more
168
-
169
- - title : Security analytics
170
- links :
171
- - url : ../sentinel/overview.md
172
- itemType : overview
173
- text : What is Microsoft Sentinel?
174
- - url : ../sentinel/quickstart-onboard.md
175
- itemType : quickstart
176
- text : Onboard Microsoft Sentinel
177
- - url : ../sentinel/get-visibility.md
178
- itemType : quickstart
179
- text : Get started with Microsoft Sentinel
180
- footerLink :
181
- url : ../sentinel/index.yml
182
- text : See more
183
-
184
- - title : Threat protection
185
- links :
186
- - url : ../security-center/security-center-alerts-overview.md
77
+ text : Securing identity with Zero Trust
78
+ - url : https://docs.microsoft.com/security/compass/overview
187
79
itemType : concept
188
- text : Security alerts in Microsoft Defender for Cloud
189
- - url : ../storage/common/azure-defender-storage-configure.md
80
+ text : Securing privleged access
81
+ - url : https://docs.microsoft.com/security/zero-trust/develop/identity
190
82
itemType : concept
191
- text : Microsoft Defender for Storage
192
- - url : /azure/azure-sql/database/threat-detection-overview
193
- itemType : concept
194
- text : Microsoft Defender for SQL
195
- footerLink :
196
- url : ./fundamentals/threat-detection.md
197
- text : See more
198
-
199
- - title : Logging and auditing
200
- links :
201
- - url : ./fundamentals/log-audit.md
202
- itemType : concept
203
- text : Azure logging & auditing
204
- - url : ./fundamentals/management-monitoring-overview.md
205
- itemType : overview
206
- text : Management and monitoring overivew
207
- footerLink :
208
- url : /search/?category=Documentation&scope=azure&search=security%2baudit%2blog
209
- text : Search for more
210
-
211
- - title : Network security
212
- links :
213
- - url : ./fundamentals/network-overview.md
214
- itemType : overview
215
- text : Security overview
216
- - url : ./fundamentals/network-best-practices.md
217
- itemType : concept
218
- text : Security best practices
219
- - url : ../ddos-protection/fundamental-best-practices.md
220
- itemType : concept
221
- text : DDoS Protection
222
-
223
- - title : Infrastructure security
224
- links :
225
- - url : ./fundamentals/physical-security.md
226
- itemType : concept
227
- text : Azure facilities, premises, & physical security
228
- - url : ./fundamentals/infrastructure-network.md
229
- itemType : concept
230
- text : Network architecture
231
- - url : ./fundamentals/protection-customer-data.md
232
- itemType : concept
233
- text : Customer data protection
234
- footerLink :
235
- url : ./fundamentals/infrastructure.md
236
- text : See more
237
-
238
- - title : Virtual machine security
239
- links :
240
- - url : ./fundamentals/virtual-machines-overview.md
241
- itemType : overview
242
- text : Security overview
243
- - url : ./fundamentals/iaas.md
244
- itemType : concept
245
- text : Best practices for IaaS workloads
246
- - url : ./fundamentals/azure-marketplace-images.md
247
- itemType : concept
248
- text : Security configuration recommendations
249
-
250
- - title : Database security
251
- links :
252
- - url : ./fundamentals/encryption-overview.md#encryption-of-data-at-rest-with-azure-sql-database
253
- itemType : overview
254
- text : Data security
255
- - url : ./fundamentals/paas-applications-using-sql.md
256
- itemType : concept
257
- text : Best practices for PaaS databases
258
- - url : ./fundamentals/database-security-checklist.md
259
- itemType : concept
260
- text : Security checklist
261
-
262
- - title : Governance and compliance
263
- links :
264
- - url : ../governance/policy/overview.md
265
- itemType : overview
266
- text : Azure Policy service
267
- - url : ../governance/blueprints/overview.md
268
- itemType : overview
269
- text : Azure Blueprints service
270
- footerLink :
271
- url : ../governance/index.yml
272
- text : See more
83
+ text : Building apps with a Zero Trust approach to identity
0 commit comments