Skip to content

Commit 335069e

Browse files
committed
fix header
1 parent 0f377e7 commit 335069e

1 file changed

Lines changed: 1 addition & 1 deletion

File tree

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/3b-design-solutions-rapid-modernization-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ You apply these principles across seven technology pillars: **identities**, **en
1616

1717
When you design Zero Trust solutions, you work across pillars simultaneously. For example, an effective Conditional Access policy integrates signals from identities (user risk), endpoints (device compliance), and applications (sensitivity level) to make a single access decision. No pillar operates in isolation—the identity team can only make so much progress before coordinating with the endpoints team.
1818

19-
## The Zero Trust RaMP approach to rapid modernization
19+
## The Zero Trust approach to rapid modernization (Zero Trust RaMP)
2020

2121
The Zero Trust adoption framework organizes rapid modernization around a lifecycle with five phases:
2222

0 commit comments

Comments
 (0)