Configuring Azure Application and Data Security
Microsoft Azure offers a wide range of options to secure and protect your data, regardless of the format. Whether you're dealing with documents, SQL databases or big data, there are multiple solutions ranging from authentication to virtual networks.
In this course, we will cover the protection of your data from external and internal threats, whether those threats be malicious or accidental. We will see how good design combined with the right configuration can secure your organization's most precious asset: its data.

Learning Objectives

  • Configure security policies to classify, protect, and manage data
  • Configure data retention for storage and databases
  • Set up Azure SQL security features and auditing
  • Learn how to configure storage account security and access
  • Learn how to secure HDInsight clusters
  • Configure Cosmos DB security
  • Configure Data Lake security
  • Learn good design features of an Azure application
  • See how Azure App Services can secure your app
  • See how a governance policy can help formalize security requirements

Intended Audience

  • People preparing for Microsoft’s AZ-500 exam
  • System administrators
  • App developers


  • Experience with Microsoft Azure
  • Experience with Office 365
  • Basic knowledge of computer security principles
  • Basic networking knowledge



Hi, and welcome to this Configuring Azure Application and Data Security Course. My name is Hallam Webber and I will be your instructor for this course. This is an intermediate-level course suited to DBAs, system analysts, programmers, or anyone wanting to learn how to make use of the security features available with Microsoft Azure cloud services. It will help to have an understanding of cloud services in general and, more specifically, Microsoft's Azure offering, as well as basic database and networking concepts.

In this scenario, we will look at securing and protecting your applications and data when moving from an on-premise to an Azure environment. Security and protection are broad topics and have different meanings in the context of different types of data and services. The Azure offerings allow you to implement different and more tightly defined security than on-premise, and at the same time free you from many of the basic infrastructure concerns. We will look at configuring security policies to classify, protect, and manage data, how to configure data infrastructure security, how to securely deploy your applications, and what Azure security features are available to your applications. We welcome all comments and feedback, so please feel free to reach out to us at with any questions or comments. Now let's begin.

About the Author
Learning Paths

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.