You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/10-summary.yml
title: Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
3
+
title: Summary
4
4
metadata:
5
-
title: Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
5
+
title: Summary
6
6
description: "Summary of module on the topic: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)."
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/4-introduction-azure-landing-zones.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/3-cloud-adoption-framework-secure-methodology.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -65,7 +65,7 @@ Codify roles, communication channels, evidence handling, and decision authority.
65
65
66
66
### Confidentiality strategy
67
67
68
-
When defining a confidentiality strategy, prioritize data privacy and protection with clear business objectives that emphasize compliance with relevant regulations (GDPR, HIPAA, industry standards). Develop a risk management strategy to identify and assess potential risks to data confidentiality. Plan for data loss prevention (DLP) by defining clear data protection objectives and establishing a framework for implementing robust encryption and access controls.
68
+
When defining a confidentiality strategy, prioritize data privacy and protection with clear business objectives that emphasize compliance with relevant regulations. Develop a risk management strategy to identify and assess potential risks to data confidentiality. Plan for data loss prevention (DLP) by defining clear data protection objectives and establishing a framework for implementing robust encryption and access controls.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/4-introduction-azure-landing-zones.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,4 +33,4 @@ While your specific implementation might vary, as a result of specific business
33
33
34
34
Use this architecture as a starting point. Download the [Visio file](https://github.com/MicrosoftDocs/cloud-adoption-framework/raw/main/docs/ready/enterprise-scale/media/enterprise-scale-architecture.vsdx) and modify it to fit your specific business and technical requirements when planning your landing zone implementation.
35
35
36
-
[](/azure/cloud-adoption-framework/ready/enterprise-scale/media/azure-landing-zone-architecture-diagram-hub-spoke.svg#lightbox)
36
+
:::image type="content" source="../media/azure-landing-zone-architecture-diagram-hub-spoke.png" alt-text="A reference architecture diagram of an Azure landing zone." lightbox="../media/azure-landing-zone-architecture-diagram-hub-spoke.png":::
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/7-well-architected-framework-security-pillar.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ Security is one of the most important aspects of any architecture. It provides t
6
6
- Integrity
7
7
- Availability
8
8
9
-
Losing these assurances can negatively affect your business operations and revenue, and your organization's reputation. For the security pillar, we'll discuss key architectural considerations and principles for security and how they apply to Azure.
9
+
Losing these assurances can negatively affect your business operations and revenue, and your organization's reputation. For the security pillar, we discuss key architectural considerations and principles for security and how they apply to Azure.
10
10
11
11
The security of complex systems depends on understanding the business context, social context, and technical context. As you design your system, cover these areas:
12
12
@@ -30,7 +30,7 @@ The economies of scale allow cloud provider specialist teams to invest in optimi
30
30
31
31
Cloud providers must be compliant with the same IT regulatory requirements as the aggregate of all their customers. Providers must develop expertise to defend against the aggregate set of adversaries who attack their customers. As a consequence, the default security posture of applications deployed to the cloud is frequently much better than that of applications hosted on-premises.
32
32
33
-
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections will be built into the particular service, while addressing others will remain the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
33
+
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections will be built into the particular service, while addressing others remain the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
34
34
35
35

36
36
@@ -65,7 +65,7 @@ We cover the following areas in the security pillar of the Microsoft Azure Well-
65
65
| Security Topic | Description |
66
66
|-------------------|-------------|
67
67
| Security design principles | These principles describe a securely architected system hosted on cloud or on-premises datacenters, or a combination of both. |
68
-
| Governance, risk, and compliance | How is the organization's security going to be monitored, audited, and reported? What types of risks does the organization face while trying to protect identifiable information, Intellectual Property (IP), financial information? Is there specific industry, government, or regulatory requirements that dictate or provide recommendations on criteria that your organization's security controls must meet? |
68
+
| Governance, risk, and compliance | How is the organization's security going to be monitored, audited, and reported? What types of risks does the organization face while trying to protect identifiable information, Intellectual Property (IP), and financial information? Are there specific industry, government, or regulatory requirements that dictate or provide recommendations on criteria that your organization's security controls must meet? |
69
69
| Regulatory compliance | Governments and other organizations frequently publish standards to help define good security practices (due diligence) so that organizations can avoid being negligent in security. |
70
70
| Administration | Administration is the practice of monitoring, maintaining, and operating Information Technology (IT) systems to meet service levels that the business requires. Administration introduces some of the highest impact security risks because performing these tasks requires privileged access to a broad set of these systems and applications. |
71
71
| Applications and services | Applications and the data associated with them ultimately act as the primary store of business value on a cloud platform. |
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8-design-security-governance-strategy.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -155,7 +155,7 @@ Consider an organization deploying a new customer-facing application with AI cap
155
155
156
156
**CAF provides strategic guidance:**
157
157
- Security objectives prioritize customer data protection
158
-
- Compliance requirements include GDPR and SOC 2
158
+
- Compliance requirements including data protection and system and organization controls
159
159
- Central security team defines data classification standards
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8a-design-devsecops-processes.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -114,7 +114,7 @@ Implement policy-as-code to:
114
114
115
115
Design pipelines that:
116
116
117
-
- Validate compliance with regulatory requirements like GDPR and HIPAA
117
+
- Validate compliance with regulatory requirements
0 commit comments