- Learn Azure Sentinel
- Richard Diver Gary Bushey Jason S. Rader
- 218字
- 2021-06-30 15:08:14
The current cloud security landscape
To understand your security architecture requirements, you must first ensure that you have a solid understanding of the IT environment that you are trying to protect. Before deploying any new security solutions, there is a need to map out the solutions that are currently deployed and how they protect each area of the IT environment. The following list provides the major components of any modern IT environment:
- Identity for authentication and authorization of access to systems.
- Networks to gain access to internal resources and the internet.
- Storage and compute in the data center for internal applications and sensitive information.
- End user devices and the applications they use to interact with the data.
- And in some environments, you can include Industrial Control Systems (ICS) and the Internet of Things (IoT).
When we start to look at the threats and vulnerabilities for these components, we quickly find ourselves deep in the alphabet soup of problems and solutions:

Figure 1.1 – The alphabet soup of cybersecurity
This is by no means an exhaustive list of the potential acronyms available. Understanding these acronyms is the first hurdle; matching them to the appropriate solutions and ensuring they are well deployed is another challenge altogether (a table of these acronyms can be found in the appendix of this book).
- 信息安全導論(在線實驗+在線自測)
- CTF實戰:技術、解題與進階
- Enterprise Cloud Security and Governance
- 計算機病毒原理與防范(第2版)
- 代碼審計:企業級Web代碼安全架構
- 網絡安全與攻防入門很輕松(實戰超值版)
- 網絡關鍵設備安全檢測實施指南
- CTF快速上手:PicoCTF真題解析(Web篇)
- Mastering Linux Security and Hardening
- Web安全攻防從入門到精通
- 一本書讀透金融科技安全
- INSTANT Microsoft Forefront UAG Mobile Configuration Starter
- AI+網絡安全:智網融合空間體系建設指南
- Web安全之機器學習入門
- 網絡安全應急響應基礎理論及關鍵技術