EPISODE · Apr 6, 2026 · 23 MIN
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security
from CyberCode Academy · host CyberCode Academy
In this lesson, you’ll learn about securing infrastructure and application workloads in Microsoft Azure, with a focus on Virtual Machines and containerized environments:Virtual Machine (VM) SecurityUnderstanding the shared responsibility model:Azure secures the cloudYou secure the OS, applications, and configurationsKey security practices:Endpoint Protection:Using Microsoft Antimalware or third-party solutionsOS Hardening:Applying Center for Internet Security benchmarksDisabling unnecessary services and tightening permissionsIdentity Management:Using Managed Identities to eliminate hard-coded credentialsUpdate Management:Automating patching with Azure Update Management for Windows & LinuxContainer Security FundamentalsUsing containers for lightweight, portable applications with DockerCore Azure container services:Azure Container Instances (ACI) – quick, serverless containersAzure Container Registry (ACR) – private image storageAzure Kubernetes Service (AKS) – container orchestrationSecurity best practices:Vulnerability Scanning:Scan images regularly for known exploitsTrusted Registries:Use private registries instead of public/unverified imagesRegistry Protection:Disable admin keysUse Azure AD + RBACEnable firewall rules and Content Trust (image signing)Container & Orchestration SecuritySecuring container workloads:Implementing network segmentationManaging secrets securely (no hardcoding)Enforcing least-privilege runtime permissionsReducing risks such as:Container escapeHost takeoverUnauthorized accessOrchestration with AKSUnderstanding Kubernetes architecture:Managed control plane (Azure-managed)Worker nodes (VMs you manage)Workloads organized into pods and namespacesPractical operations:Deploying apps using kubectlConfiguring secure access to ACR using service principalsMonitoring workloads via Kubernetes dashboardKey TakeawaysVM security depends on hardening, patching, and identity controlContainer security requires trusted images and strict access controlACR and AKS provide secure, scalable platforms when configured properlyDefense-in-depth is essential across VMs, containers, and orchestration layersThis lesson equips you with the skills to secure both traditional VM workloads and modern containerized applications in Azure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy
NOW PLAYING
Course 29 - AZ-500 Microsoft Azure Security Technologies | Episode 7: A Comprehensive Guide to Virtual Machine and Container Security
No transcript for this episode yet
Similar Episodes
May 13, 2026 ·39m
May 11, 2026 ·45m
May 1, 2026 ·19m