Centralized app configuration and security
Use Azure App Configuration and Azure Key Vault to create a centralized and secured configuration service for apps.
Use Azure App Configuration and Azure Key Vault to create a centralized and secured configuration service for apps.
Protect Azure VMs by implementing two types of just-in-time access. Align with security principles like defense in depth, least privilege,…
Create an infrastructure and workflow to ensure a valid digital evidence chain of custody (CoC) for computer forensics in Azure.
Restrict communications between two Azure App Service backend services on both the application and network layers.
Learn how to track how users use your distributed applications and services, trace resource utilization, and monitor the health and…
Import threat indicators, view logs, and create rules to generate security alerts and incidents, and visualize threat intelligence data with…
Learn about VM security, encryption, NSGs, DMZs, access control, and other security considerations for highly sensitive IaaS and hybrid apps.
Learn how security operations teams can use Azure Active Directory identity and access features in an adaptive, integrated zero-trust security…
Help secure the connection to a Microsoft Teams channel bot’s web app by using Azure Private Link and Azure Private…
Get an overview of Azure security technologies, guidance offerings, solution ideas, and reference architectures.
See how Microsoft Defender for Cloud Apps and Microsoft Sentinel can help secure and protect Amazon Web Services (AWS) account…
Learn how to store OAuth 2.0 On-Behalf-Of (OBO) refresh tokens securely using Azure Key Vault and Azure Functions managed identity…
Integrate Azure monitoring services and Azure security services to provide defense in depth to your IT environment. This article introduces…
Analyze data in real time to detect fraudulent transactions or other anomalous activity using Azure Event Hubs and Stream Analytics.
Set up improved-security private connectivity to a multitenant web app or function app from an on-premises network or from within…
See an architecture that protects backend APIs by using API Management and Azure AD B2C to validate bearer tokens. The…
Learn about deploying secure applications using the Azure App Service Environment, the Azure Application Gateway service, and Web Application Firewall.
Create a highly available SQL Managed Instance design by using customer-managed keys stored in Azure Key Vault.
Learn how to monitor an end-to-end distributed system by using OpenCensus for Python and Application Insights.