官术网_书友最值得收藏!

Summary

In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.

Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.

In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.

主站蜘蛛池模板: 拜城县| 通江县| 禹城市| 万荣县| 香格里拉县| 额尔古纳市| 虎林市| 余江县| 霍城县| 阿图什市| 宁陕县| 彰化市| 平凉市| 东阿县| 莎车县| 新干县| 建平县| 德兴市| 改则县| 黄浦区| 武胜县| 清河县| 汝城县| 峨边| 衡南县| 龙胜| 庆元县| 迭部县| 上虞市| 恩平市| 平罗县| 视频| 长宁县| 郑州市| 桂林市| 临夏县| 景宁| 白山市| 五莲县| 四平市| 丰原市|