SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls
Duration: 1 Day
Learn how to secure Azure services and workloads using Microsoft Defender for Cloud and regulatory compliance controls. You configure network security, set up monitoring with Log Analytics, implement just-in-time access, and secure connectivity using private endpoints.
Prerequisites
- None
Examine Defender for Cloud regulatory compliance standards
In this module, we will focus on using Microsoft Defender for Cloud to streamline regulatory compliance by identifying and addressing issues that hinder meeting compliance standards and certifications.
- Introduction
- Regulatory compliance standards in Defender for Cloud
- Microsoft cloud security benchmark in Defender for Cloud
- Improve your regulatory compliance in Defender for Cloud
Enable Defender for Cloud on your Azure subscription
In this module, we will focus on enabling Microsoft Defender for Cloud on your Azure subscription to enhance security monitoring, compliance management, and threat protection for your cloud-based applications.
- Introduction
- Connect your Azure subscriptions
- Exercise - Configuring Microsoft Defender for Cloud for Enhanced Protection
Filter network traffic with a network security group using the Azure portal
In this module, we will focus on filtering network traffic using Network Security Groups (NSGs) in the Azure portal. Learn how to create, configure, and apply NSGs for improved network security.
- Introduction
- Azure resource group
- Azure Virtual Network
- How network security groups filter network traffic
- Application security groups
- Exercise - Create a virtual network infrastructure
Collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent
This module will guide you on how to deploy and manage Azure Monitor Agent, configure Data Collection Rules, and integrate it with Microsoft Defender for Cloud for enhanced security.
- Introduction
- Deploy the Azure Monitor Agent
- Collect data with Azure Monitor Agent
- Exercise - Create a data collection rule and install the Azure Monitor Agent
Explore just-in-time virtual machine access
In this module, we focus on the risk of open management ports on virtual machines and how Just in Time (JIT) VM access in Microsoft Defender for Cloud mitigates this threat.
- Introduction
- Understand just-in-time virtual machine access
- Enable just-in-time access on virtual machines
- Exercise - Enable just-in-time access on virtual machines
Configure Azure Key Vault networking settings
In this module, you'll learn to configure Azure Key Vault networking settings via the Azure portal, ensuring secure and controlled access to your stored secrets.
- Introduction
- Azure Key Vault basic concepts
- Best practices for Azure Key Vault
- Azure Key Vault network security
- Configure Azure Key Vault firewalls and virtual networks
- Exercise - Configure Key Vault networking settings
- Azure Key Vault soft delete overview
- Virtual network service endpoints for Azure Key Vault
- Exercise - Enable soft delete in Azure Key Vault
Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal
This module will guide you on securely connecting an Azure SQL server via Azure Private Endpoint in the Azure portal, enhancing data communication security.
- Introduction
- Azure Private Endpoint
- Azure Private Link
- Exercise - Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal