Přeskočit na hlavní obsah

Governing Your Azure Workloads

Tento materiál je dostupný v: English.

Publikováno: 22.01.2020

Common attacks against cloud resources include accessing service endpoints exposed to the Internetbrute forcing weak passwords, re-using stolen credentials, and access to exposed data storage containers.  The root cause leading to the success of these attacks is typically misconfigurations in the deployment and operation of cloud workloads.  Although public clouds present unique challenges to security teams, Azure comes with several tools that can help prevent such attacks from occurring.