Azure Lighthouse limitations
So we tried to implement by the book the recently released Azure Lighthouse in order to centrally manage multiple Azure customers. The recommended Contributor role… Read More »Azure Lighthouse limitations
So we tried to implement by the book the recently released Azure Lighthouse in order to centrally manage multiple Azure customers. The recommended Contributor role… Read More »Azure Lighthouse limitations
Many attack vectors are seen at about the same rate as on-premises including social engineering, phishing and ransomware. Microsoft has observed some differences from traditional… Read More »Azure Security Threats are the same and different…
This is Part#10 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Consider Retiring Legacy Security Approaches
This is Part#9 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Mitigate DDoS Attacks
This is Part#8 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Implement Web Application Firewalls (WAFs)
This is Part#6 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Assign and publish roles and responsibilities
This is Part#7 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Choose and Implement a Firewall Strategy
This is Part#5 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Follow DevOps security guidance
This is Part#4 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Monitor for Potential Attacks
This is Part#3 of our series of articles about best security practices that you can apply to an Azure environment. Please note that all the… Read More »Azure Security best practice: Enterprise segmentation & Zero Trust preparation