Skip to content

Commit 155b8c9

Browse files
committed
address pr issues
1 parent 3b99952 commit 155b8c9

9 files changed

Lines changed: 12 additions & 12 deletions

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/10-summary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-align-cloud-adoption-framework-well-architected-framework.summary
3-
title: Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
3+
title: Summary
44
metadata:
5-
title: Summary - Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)
5+
title: Summary
66
description: "Summary of module on the topic: Design solutions that align with the Cloud Adoption Framework (CAF) and Well-Architected Framework (WAF)."
77
ms.date: 01/24/2026
88
author: ceperezb

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/4-introduction-azure-landing-zones.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-align-cloud-adoption-framework-well-architected-framework.introduction-azure-landing-zones
3-
title: Understand Azure Landing Zones
3+
title: Understand Azure landing zones
44
metadata:
5-
title: Understand Azure Landing Zones
6-
description: "Understand Azure Landing Zones."
5+
title: Understand Azure landing zones
6+
description: "Understand Azure landing zones."
77
ms.date: 01/24/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/3-cloud-adoption-framework-secure-methodology.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ Codify roles, communication channels, evidence handling, and decision authority.
6565

6666
### Confidentiality strategy
6767

68-
When defining a confidentiality strategy, prioritize data privacy and protection with clear business objectives that emphasize compliance with relevant regulations (GDPR, HIPAA, industry standards). Develop a risk management strategy to identify and assess potential risks to data confidentiality. Plan for data loss prevention (DLP) by defining clear data protection objectives and establishing a framework for implementing robust encryption and access controls.
68+
When defining a confidentiality strategy, prioritize data privacy and protection with clear business objectives that emphasize compliance with relevant regulations. Develop a risk management strategy to identify and assess potential risks to data confidentiality. Plan for data loss prevention (DLP) by defining clear data protection objectives and establishing a framework for implementing robust encryption and access controls.
6969

7070
### Integrity strategy
7171

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/4-introduction-azure-landing-zones.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,4 +33,4 @@ While your specific implementation might vary, as a result of specific business
3333

3434
Use this architecture as a starting point. Download the [Visio file](https://github.com/MicrosoftDocs/cloud-adoption-framework/raw/main/docs/ready/enterprise-scale/media/enterprise-scale-architecture.vsdx) and modify it to fit your specific business and technical requirements when planning your landing zone implementation.
3535

36-
[![A reference architecture diagram of an Azure landing zone.](/azure/cloud-adoption-framework/ready/enterprise-scale/media/azure-landing-zone-architecture-diagram-hub-spoke.svg)](/azure/cloud-adoption-framework/ready/enterprise-scale/media/azure-landing-zone-architecture-diagram-hub-spoke.svg#lightbox)
36+
:::image type="content" source="../media/azure-landing-zone-architecture-diagram-hub-spoke.png" alt-text="A reference architecture diagram of an Azure landing zone." lightbox="../media/azure-landing-zone-architecture-diagram-hub-spoke.png":::

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/7-well-architected-framework-security-pillar.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Security is one of the most important aspects of any architecture. It provides t
66
- Integrity
77
- Availability
88

9-
Losing these assurances can negatively affect your business operations and revenue, and your organization's reputation. For the security pillar, we'll discuss key architectural considerations and principles for security and how they apply to Azure.
9+
Losing these assurances can negatively affect your business operations and revenue, and your organization's reputation. For the security pillar, we discuss key architectural considerations and principles for security and how they apply to Azure.
1010

1111
The security of complex systems depends on understanding the business context, social context, and technical context. As you design your system, cover these areas:
1212

@@ -30,7 +30,7 @@ The economies of scale allow cloud provider specialist teams to invest in optimi
3030

3131
Cloud providers must be compliant with the same IT regulatory requirements as the aggregate of all their customers. Providers must develop expertise to defend against the aggregate set of adversaries who attack their customers. As a consequence, the default security posture of applications deployed to the cloud is frequently much better than that of applications hosted on-premises.
3232

33-
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections will be built into the particular service, while addressing others will remain the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
33+
**Shared Responsibility Model:** As computing environments move from customer-controlled datacenters to the cloud, the responsibility of security also shifts. Security of the operational environment is now a concern shared by both cloud providers and customers. Organizations can reduce focus on activities that aren't core business competencies by shifting these responsibilities to a cloud service like Azure. Depending on the specific technology choices, some security protections will be built into the particular service, while addressing others remain the customer's responsibility. To ensure that proper security controls are provided, organizations must carefully evaluate the services and technology choices.
3434

3535
![Diagram showing shared responsibility and key strategies.](../media/shared-resp-color.png)
3636

@@ -65,7 +65,7 @@ We cover the following areas in the security pillar of the Microsoft Azure Well-
6565
| Security Topic | Description |
6666
|-------------------|-------------|
6767
| Security design principles | These principles describe a securely architected system hosted on cloud or on-premises datacenters, or a combination of both. |
68-
| Governance, risk, and compliance | How is the organization's security going to be monitored, audited, and reported? What types of risks does the organization face while trying to protect identifiable information, Intellectual Property (IP), financial information? Is there specific industry, government, or regulatory requirements that dictate or provide recommendations on criteria that your organization's security controls must meet? |
68+
| Governance, risk, and compliance | How is the organization's security going to be monitored, audited, and reported? What types of risks does the organization face while trying to protect identifiable information, Intellectual Property (IP), and financial information? Are there specific industry, government, or regulatory requirements that dictate or provide recommendations on criteria that your organization's security controls must meet? |
6969
| Regulatory compliance | Governments and other organizations frequently publish standards to help define good security practices (due diligence) so that organizations can avoid being negligent in security. |
7070
| Administration | Administration is the practice of monitoring, maintaining, and operating Information Technology (IT) systems to meet service levels that the business requires. Administration introduces some of the highest impact security risks because performing these tasks requires privileged access to a broad set of these systems and applications. |
7171
| Applications and services | Applications and the data associated with them ultimately act as the primary store of business value on a cloud platform. |

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8-design-security-governance-strategy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ Consider an organization deploying a new customer-facing application with AI cap
155155

156156
**CAF provides strategic guidance:**
157157
- Security objectives prioritize customer data protection
158-
- Compliance requirements include GDPR and SOC 2
158+
- Compliance requirements including data protection and system and organization controls
159159
- Central security team defines data classification standards
160160

161161
**Landing zones provide the foundation:**

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/8a-design-devsecops-processes.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ Implement policy-as-code to:
114114

115115
Design pipelines that:
116116

117-
- Validate compliance with regulatory requirements like GDPR and HIPAA
117+
- Validate compliance with regulatory requirements
118118
- Generate audit evidence automatically
119119
- Track security controls and their effectiveness
120120

Loading
-11.1 KB
Loading

0 commit comments

Comments
 (0)