Abstract
The most important design aspect of any architecture is defining the resource security boundaries. In Microsoft Azure, these boundaries are defined at different levels, the topmost being the subscription, followed by resource groups, and then the individual resources. Any permissions assigned at the top level are automatically inherited by the child resources.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Shijimol Ambi Karthikeyan
About this chapter
Cite this chapter
Ambi Karthikeyan, S. (2018). Practical Azure Security. In: Practical Microsoft Azure IaaS. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-3763-2_8
Download citation
DOI: https://doi.org/10.1007/978-1-4842-3763-2_8
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-3762-5
Online ISBN: 978-1-4842-3763-2
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)