- Home
- Training Library
- Microsoft Azure
- Courses
- Configuring Azure Application and Data Security
Configuring Data Sovereignty
Contents
Introduction
Data Classification & Protection
Data Retention & Storage
Data Sovereignty
Databases
Access to Storage
Security
Application Security
Metrics and Risk
Summary
The course is part of this learning path
Learning Objectives
- Configure security policies to classify, protect, and manage data
- Configure data retention for storage and databases
- Set up Azure SQL security features and auditing
- Learn how to configure storage account security and access
- Learn how to secure HDInsight clusters
- Configure Cosmos DB security
- Configure Data Lake security
- Learn good design features of an Azure application
- See how Azure App Services can secure your app
- See how a governance policy can help formalize security requirements
Intended Audience
- People preparing for Microsoft’s AZ-500 exam
- System administrators
- App developers
Prerequisites
- Experience with Microsoft Azure
- Experience with Office 365
- Basic knowledge of computer security principles
- Basic networking knowledge
Technical and regulatory factors are the two main considerations when deciding where to deploy your data and resources geographically. Most of your services can be deployed to a user-specified region, although there are some services, like Azure Active Directory, that could be deployed in a non-region-specific datacenter. Azure provides policies, such as Allowed Locations, to restrict where an organization can deploy its resources. An allowed region locations policy is defined using JSON and can be deployed using the Azure Portal, or Azure PowerShell, Azure Command Line Interface, or REST API.
Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.