官术网_书友最值得收藏!

Summary

In this chapter, we introduced Azure Sentinel and how it fits into the cloud security landscape. We explored some of the widely used acronyms for both problems and solutions and then provided a useful method of mapping these technical controls to the wide array of options available from many security platform providers today. We also looked at the future state of SOC architecture to ensure you can gain visibility and control across your entire infrastructure: physical, virtual, and cloud-hosted.

Finally, we looked at the potential cost of running Azure Sentinel as a core component of your security architecture and how to carry out the scenario-mapping exercise to ensure you are constantly reviewing the detections, the usefulness of the data, and your ability to detect and respond to current threats.

In the next chapter, we will take the first steps toward deploying Azure Sentinel by configuring an Azure Monitor workspace. Azure Monitor is the bedrock of Azure Sentinel for storing and searching log data. By understanding this data collection and analysis engine, you will gain a deeper understanding of the potential benefits of deploying Azure Sentinel in your environment.

主站蜘蛛池模板: 金湖县| 乌鲁木齐县| 五台县| 米泉市| 新乐市| 玛纳斯县| 四子王旗| 泌阳县| 娄底市| 剑阁县| 黑水县| 垫江县| 孟津县| 集安市| 双城市| 交口县| 泰和县| 固始县| 桓台县| 宝清县| 恩平市| 浙江省| 兴和县| 临朐县| 建昌县| 崇左市| 平遥县| 苍梧县| 镇原县| 白城市| 新宁县| 永兴县| 达州市| 怀来县| 饶河县| 修武县| 塔城市| 山阴县| 沾化县| 潮州市| 佛冈县|