Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Azure Data and AI Architect Handbook

You're reading from  Azure Data and AI Architect Handbook

Product type Book
Published in Jul 2023
Publisher Packt
ISBN-13 9781803234861
Pages 284 pages
Edition 1st Edition
Languages
Authors (2):
Olivier Mertens Olivier Mertens
Profile icon Olivier Mertens
Breght Van Baelen Breght Van Baelen
Profile icon Breght Van Baelen
View More author details

Table of Contents (18) Chapters

Preface Part 1: Introduction to Azure Data Architect
Chapter 1: Introduction to Data Architectures Chapter 2: Preparing for Cloud Adoption Part 2: Data Engineering on Azure
Chapter 3: Ingesting Data into the Cloud Chapter 4: Transforming Data on Azure Chapter 5: Storing Data for Consumption Part 3: Data Warehousing and Analytics
Chapter 6: Data Warehousing Chapter 7: The Semantic Layer Chapter 8: Visualizing Data Using Power BI Chapter 9: Advanced Analytics Using AI Part 4: Data Security, Governance, and Compliance
Chapter 10: Enterprise-Level Data Governance and Compliance Chapter 11: Introduction to Data Security Index Other Books You May Enjoy

Network security

Much like IAM, networking and network security are huge domains. The exact network security configurations are often best kept for experts in the field, but it is still valuable for a cloud data architect to grasp the principles of securing networks.

The PoLP in access management stated that any identity should have the least amount of access to complete the job. Similar to this, in network security, endpoints should have the least possible exposure.

First, this comes down to not blindly opening up all endpoints to the public internet. This is, however, the default option in many Azure services. It is possible to deny public network access on the resource level, or we could enforce any resource of a given type to have disabled public network access by using Azure Policy. Azure Policy is further explained at the end of this chapter.

By disabling all access from the public network, the resources can only be accessed through private endpoints. This prevents...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}