This guide will provides prescriptive guidance and deployment strategy, we will start this guide by explaining how to secure your data Secure control of data in Azure
IaaS Encryption At Rest PaaS Encryption at Rest Encryption In Transit Encryption In Use
First public cloud to offer Intel Software Guard Extensions (SGX) enclaves
In-place encryption and key management Azure Key Vault Protect cryptographic keys with FIPS 140 2 Level 2 & Level 3 HSM by Thales Encrypt Azure VMs, Azure Data Lake, SQL Server, and other apps with a key in your key vault. The key never leaves the vault. Available as a service in every azure region Cost: Pay-as-you-go As security summary you have to:
Subscription Structure Microsoft recommended to have a separated subscription for each workload such as Dev/Test and Production Azure Reference Architecture Microsoft Cybersecurity Reference Architecture References
0 Comments
Leave a Reply. |
Author
Mohammad Al Rousan is a Solution Architect @ Diyar United Company. My technology focus as a Cloud nowadays includes Docker, Kubernetes Service, Container, Azure DevOps, IaaS, PaaS, DBaaS, as well Terraform and other serverless components in Azure e.g. Logic Apps and Functions Top 10 Microsoft Azure Blogs
Archives
December 2020
Categories
All
|