Cloud Defense Strategies with Azure Sentinel: Hands-On Threat Hunting in Cloud Logs and Services


Price:
Sale price$54.99

Description

Part I (page count 100)

Goals: Introduction to Azure Sentinel es with technical featurthat benefit the business. Initial configuration using Azure subscription data connectors, discuss 3rd party integration and alignment with other Azure Security Services. XDR introduction, why it is an industry standard and how to use it in Sentinel.

Sub-Topics

1. Overview of Technical Features

2. Benefit and cost support for the business, initial configuration

3. Azure Defender support into Azure Sentinel

4. Azure Security Center support into Azure Sentinel

Chapter 1 Azure Sentinel Overview

Platform benefits, SOC security reference, alignment to Cyber framework, Log Analytics planning, cost structure

Chapter 2 Other Azure Security Services

Azure Monitor, Azure Security Center, Azure Defender, working together to support Azure Sentinel

Chapter 3 Azure Sentinel XDR Capabilities

Integration with Azure Security standards, protection for additional Azure workloads, guidance for XDR and how it should be used to modernize security operations.

Part II (page count 100)

Goals: Deployment best practices, platform integration and support for AWS

Sub - Topics

1. Enable integration with 3rd party security appliances

2. Configure support for AWS

3. Multi-Azure Tenant deployment best practices

Chapter 4 Data Connection

Single Tenant: Data connectors native, Log Analytics storage options, 3rd party data, KQL validation processes, AWS connection, Service NOW integration

Chapter 5 Threat Intelligence (TI)

TI connectors and feeds, Sentinel Workbooks introduction, Sentinel Notebook usage, Python integration

Chapter 6 Multi-Tenant Architecture

Challenges and cost of Azure log analytics workspace, KQL modification requirements, SOC alignment needed

Part III (page count 100)

Goals: Improve Cyber Security Threat Hunting Techniques

Sub - Topics:

1. Threat Hunting with KQL Language deep dive with examples

2. Integration with MITRE attack Matrix and support for TAXII

3. Data flow examples: User logon, track and validate. Stop network connection to China, etc.

4. Configuration changes needed for multiple Sentinel deployments

Chapter 7 Threat Hunting with Azure Sentinel

KQL Hunting introduction, custom queries, Sentinel bookmarks, Sentinel notebooks

Chapter 8 Introduction to MITRE Matrix

MITRE Attack Matrix overview and usage, STIX defined, TAXII defined, free TI -vs- service SLA

Chapter 9 Azure Sentinel Operations

Daily, Weekly, Monthly tasks, SOC engineer alignment, Continued SOC operations support from official Microsoft supported forum

Chapter Appendix:

Chapter Goal: Where to gain additional knowledge for Azure Sentinel

No of pages: 20

Sub - Topics:

1. Guidance to continue Azure Sentinel skill improvement

2. Relating information to Cyber Security standards



Author: Marshall Copeland
Publisher: Apress
Published: 10/07/2021
Pages: 300
Binding Type: Paperback
Weight: 1.17lbs
Size: 10.00h x 7.00w x 0.64d
ISBN13: 9781484271315
ISBN10: 1484271319
BISAC Categories:
- Computers | Programming | Microsoft
- Computers | Security | General

About the Author
Marshall Copeland is a Senior Consultant focused on Cyber Security in Azure public cloud defensive deployments using Azure cloud native and third-party cyber solutions. His work focuses on security in customers hybrid cloud deployments, Secure DevOps and security partner cloud integrations that enhance "blue team hunting" efficiencies. Marshall currently works at Microsoft Corporation supporting enterprise customers security teams using Azure security services for hybrid network security management and data protection. He previously worked in cloud security roles at Optiv Security, and Salesforce.