-
Notifications
You must be signed in to change notification settings - Fork 21.8k
Expand file tree
/
Copy pathindex.yml
More file actions
232 lines (213 loc) · 10.4 KB
/
index.yml
File metadata and controls
232 lines (213 loc) · 10.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
### YamlMime:Hub
title: Azure security documentation
summary: Azure offers security advantages that support compliance efforts, and provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
brand: azure
metadata:
title: Azure security documentation
description: Azure offers security advantages that support your compliance efforts, provide cost-effective security for your organization, and help protect your hybrid and multicloud platforms, applications, and data.
ms.service: security
ms.topic: hub-page
author: msmbaldwin
ms.author: mbaldwin
ms.date: 02/12/2026
highlightedContent:
items:
- title: Zero Trust security in Azure
itemType: concept
url: ./fundamentals/zero-trust.md
- title: AI shared responsibility model
itemType: concept
url: ./fundamentals/shared-responsibility-ai.md
- title: Ransomware protection in Azure
itemType: concept
url: ./fundamentals/ransomware-protection.md
- title: Microsoft Defender for Cloud
itemType: overview
url: /azure/defender-for-cloud/defender-for-cloud-introduction
- title: Unified security operations with Microsoft Sentinel
itemType: overview
url: /unified-secops-platform/overview-unified-security
- title: Network security best practices
itemType: how-to-guide
url: ./fundamentals/network-best-practices.md
- title: Encryption overview
itemType: concept
url: ./fundamentals/encryption-overview.md
- title: Identity management best practices
itemType: how-to-guide
url: ./fundamentals/identity-management-best-practices.md
conceptualContent:
items:
- title: Security fundamentals
links:
- url: ./fundamentals/overview.md
itemType: overview
text: Introduction to Azure security
- url: ./fundamentals/shared-responsibility.md
itemType: concept
text: Shared responsibility in the cloud
- url: ./fundamentals/end-to-end.md
itemType: concept
text: End-to-end security in Azure
- title: Threat protection
links:
- url: ./fundamentals/ransomware-protection.md
itemType: concept
text: Ransomware protection in Azure
- url: ./fundamentals/threat-detection.md
itemType: concept
text: Azure threat detection
- url: ./fundamentals/backup-plan-to-protect-against-ransomware.md
itemType: how-to-guide
text: Back up and restore plan for ransomware
- title: Zero Trust and identity
links:
- url: ./fundamentals/zero-trust.md
itemType: concept
text: Zero Trust security in Azure
- url: /security/zero-trust/deploy/identity
itemType: how-to-guide
text: Securing identity with Zero Trust
- url: ./fundamentals/identity-management-best-practices.md
itemType: how-to-guide
text: Identity management best practices
additionalContent:
sections:
- title: Security guidance for each phase of your cloud migration
items:
- title: Strategy and planning
summary: Define business justification and expected outcomes of adoption
links:
- url: /azure/cloud-adoption-framework/strategy/define-security-strategy
text: Define a security strategy
- url: /azure/cloud-adoption-framework/secure/
text: Envision a security end state
- url: /azure/cloud-adoption-framework/plan/
text: Develop a cloud adoption plan
- title: Implementation and operation
summary: Migrate and modernize security operations management
links:
- url: /azure/cloud-adoption-framework/ready/landing-zone/
text: Application migration, modernization, and innovation
- url: /azure/cloud-adoption-framework/manage/
text: Cloud management for operations team and architects
- url: /azure/cloud-adoption-framework/innovate/
text: Unlock new technical skills and expand capabilities
- title: Cloud architecture
summary: Design, build, and continuously improve your cloud architecture
links:
- url: /azure/architecture/guide/security/security-start-here
text: Security architecture design
- url: /azure/architecture/framework/security/overview
text: Security pillar of your architecture
- url: /security/cybersecurity-reference-architecture/mcra
text: Microsoft Cybersecurity Reference Architectures
- title: Continued learning
summary: Discover learning paths that help you improve your security in the cloud
links:
- url: /training/modules/m365-compliance-information-governance/
text: Information protection and governance in Microsoft 365
- url: /training/paths/secure-your-cloud-apps/
text: Secure your cloud applications in Azure
- url: /training/modules/perimeter-security/
text: Implement perimeter security
- title: Additional security guidance
items:
- title: Microsoft Learn training
summary: Build your skills with Microsoft Learn security training
url: /training/browse/?products=azure&roles=security-engineer%2Csecurity-operations-analyst
- title: Microsoft Cloud Adoption Framework
summary: Security methodology for cloud architects and decision makers
url: /azure/cloud-adoption-framework/secure/
- title: Azure security fundamentals
summary: Learn how to secure your cloud solutions on Azure
url: ./fundamentals/index.yml
- title: Azure Security Benchmark
summary: Best practices and recommendations to secure your cloud deployments
url: /security/benchmark/azure/introduction
- title: Azure Well-Architected Framework
summary: Security pillar for cloud and hybrid architectures
url: /azure/architecture/framework/security/overview
- title: Secrets management best practices
summary: Safeguard cryptographic keys, certificates, and secrets
url: ./fundamentals/secrets-best-practices.md
- title: Security services and capabilities
items:
- title: Microsoft Sentinel
summary: See and stop threats before they cause harm
links:
- url: ../sentinel/overview.md
text: Overview
- url: ../sentinel/quickstart-onboard.md
text: Onboard Microsoft Sentinel
- url: /training/paths/security-ops-sentinel/
text: "Learn: Cloud-native security operations with Microsoft Sentinel"
- title: Microsoft Defender for Cloud
summary: Unify security management and advanced threat protection across hybrid cloud workloads
links:
- url: /azure/defender-for-cloud/defender-for-cloud-introduction
text: Overview
- url: /azure/defender-for-cloud/tutorial-protect-resources
text: Protect your resources
- url: /training/paths/sc-200-mitigate-threats-using-azure-defender/
text: "Learn: Mitigate threats using Microsoft Defender for Cloud"
- title: Microsoft Defender for Identity
summary: Improve security of hybrid environments from cyber attacks and insider threats
links:
- url: /defender-for-identity/what-is
text: Overview
- url: /defender-for-identity/deploy-defender-identity
text: Deploy Microsoft Defender for Identity with Microsoft Defender XDR
- url: /training/modules/defender-identity-defend-attacks/
text: "Learn: Defend against attacks"
- title: Azure key management
summary: Key management solutions in Azure
links:
- url: ./fundamentals/key-management.md
text: Key management in Azure
- url: ./fundamentals/key-management-choose.md
text: Choosing a key management solution
- url: /azure/key-vault/
text: Azure Key Vault
- url: /azure/key-vault/managed-hsm/
text: Azure Managed HSM
- url: /azure/payment-hsm/
text: Azure Payment-HSM
- title: Microsoft Defender for Cloud Apps
summary: Cloud Access Security Broker (CASB) that operates on multiple clouds
links:
- url: /defender-cloud-apps/what-is-defender-for-cloud-apps
text: Overview
- url: /defender-cloud-apps/get-started
text: Get started
- url: /defender-cloud-apps/tutorial-suspicious-activity
text: Detect and manage suspicious activity
- url: /training/modules/microsoft-cloud-app-security/
text: "Learn: Secure your cloud apps and services"
- title: Microsoft Defender for IoT
summary: Threat detection for IoT/OT environments
links:
- url: ../defender-for-iot/overview.md
text: Overview
- url: ../defender-for-iot/getting-started.md
text: Get started with Defender for IoT
- url: /training/paths/enhance-iot-solution-security-by-using-azure-defender/
text: "Learn: Enhance IoT solution security"
- title: Microsoft Entra ID
summary: Cloud-based identity and access management service
links:
- url: /entra/fundamentals/whatis
text: Overview
- url: /entra/architecture/security-operations-introduction
text: Security operations guide
- url: /training/modules/secure-aad-users-with-mfa/
text: "Learn: Secure users with multifactor authentication"
- title: Microsoft Defender XDR
summary: Security solutions that protect your enterprise across attack surfaces
links:
- url: /microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
text: Overview
- url: /microsoft-365/security/defender/get-started?view=o365-worldwide
text: Get started
- url: /microsoft-365/security/defender/integrate-microsoft-365-defender-secops?view=o365-worldwide
text: Security operations guide