SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls

SC-5002: Secure Azure services and workloads with Microsoft Defender for Cloud regulatory compliance controls

Duration: 1 Day

Learn how to secure Azure services and workloads using Microsoft Defender for Cloud and regulatory compliance controls. You configure network security, set up monitoring with Log Analytics, implement just-in-time access, and secure connectivity using private endpoints.

Prerequisites

  • None

Examine Defender for Cloud regulatory compliance standards

In this module, we will focus on using Microsoft Defender for Cloud to streamline regulatory compliance by identifying and addressing issues that hinder meeting compliance standards and certifications.

  • Introduction
  • Regulatory compliance standards in Defender for Cloud
  • Microsoft cloud security benchmark in Defender for Cloud
  • Improve your regulatory compliance in Defender for Cloud

Enable Defender for Cloud on your Azure subscription

In this module, we will focus on enabling Microsoft Defender for Cloud on your Azure subscription to enhance security monitoring, compliance management, and threat protection for your cloud-based applications.

  • Introduction
  • Connect your Azure subscriptions
  • Exercise - Configuring Microsoft Defender for Cloud for Enhanced Protection

Filter network traffic with a network security group using the Azure portal

In this module, we will focus on filtering network traffic using Network Security Groups (NSGs) in the Azure portal. Learn how to create, configure, and apply NSGs for improved network security.

  • Introduction
  • Azure resource group
  • Azure Virtual Network
  • How network security groups filter network traffic
  • Application security groups
  • Exercise - Create a virtual network infrastructure

Collect guest operating system monitoring data from Azure and hybrid virtual machines using Azure Monitor Agent

This module will guide you on how to deploy and manage Azure Monitor Agent, configure Data Collection Rules, and integrate it with Microsoft Defender for Cloud for enhanced security.

  • Introduction
  • Deploy the Azure Monitor Agent
  • Collect data with Azure Monitor Agent
  • Exercise - Create a data collection rule and install the Azure Monitor Agent

Explore just-in-time virtual machine access

In this module, we focus on the risk of open management ports on virtual machines and how Just in Time (JIT) VM access in Microsoft Defender for Cloud mitigates this threat.

  • Introduction
  • Understand just-in-time virtual machine access
  • Enable just-in-time access on virtual machines
  • Exercise - Enable just-in-time access on virtual machines

Configure Azure Key Vault networking settings

In this module, you'll learn to configure Azure Key Vault networking settings via the Azure portal, ensuring secure and controlled access to your stored secrets.

  • Introduction
  • Azure Key Vault basic concepts
  • Best practices for Azure Key Vault
  • Azure Key Vault network security
  • Configure Azure Key Vault firewalls and virtual networks
  • Exercise - Configure Key Vault networking settings
  • Azure Key Vault soft delete overview
  • Virtual network service endpoints for Azure Key Vault
  • Exercise - Enable soft delete in Azure Key Vault

Connect an Azure SQL server using an Azure Private Endpoint using the Azure portal

This module will guide you on securely connecting an Azure SQL server via Azure Private Endpoint in the Azure portal, enhancing data communication security.

  • Introduction
  • Azure Private Endpoint
  • Azure Private Link
  • Exercise - Connect to an Azure SQL server using an Azure Private Endpoint using the Azure portal
This class has hands-on labs provided by Go Deploy.