Skip to content

Commit 3b269bb

Browse files
committed
fix blocking issues and minor edit on unit titles
1 parent b8a8619 commit 3b269bb

8 files changed

Lines changed: 47 additions & 49 deletions

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 4 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -729,23 +729,13 @@
729729
"redirect_document_id": false
730730
},
731731
{
732-
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-operations/4-design-security-information-event-management-solutions.yml",
733-
"redirect_url": "/training/modules/design-solutions-security-operations/design-centralized-logging-auditing",
732+
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-operations/includes/4-design-security-information-event-management-solutions.yml",
733+
"redirect_url": "/training/modules/design-solutions-security-operations/5-design-solutions-detection-response",
734734
"redirect_document_id": false
735735
},
736736
{
737-
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-operations/includes/4-design-security-information-event-management-solutions.md",
738-
"redirect_url": "/training/modules/design-solutions-security-operations/design-centralized-logging-auditing",
739-
"redirect_document_id": false
740-
},
741-
{
742-
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/5-evaluate-security-posture-secure-scores.yml",
743-
"redirect_url": "/training/modules/design-solutions-security-posture-management-hybrid-multicloud-environments/evaluate-security-posture-microsoft-defender-cloud",
744-
"redirect_document_id": false
745-
},
746-
{
747-
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/5-evaluate-security-posture-secure-scores.md",
748-
"redirect_url": "/training/modules/design-solutions-security-posture-management-hybrid-multicloud-environments/evaluate-security-posture-microsoft-defender-cloud",
737+
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/5-evaluate-security-posture-secure-scores.yml",
738+
"redirect_url": "/training/modules/design-solutions-security-posture-management-hybrid-multicloud-environments/4-evaluate-security-posture-microsoft-defender-cloud",
749739
"redirect_document_id": false
750740
}
751741
]
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-security-posture-management-hybrid-multicloud-environments.evaluate-security-posture-microsoft-cloud-security-benchmark
3-
title: Evaluate security posture by using Microsoft Cloud Security Benchmark
3+
title: Use the Microsoft Cloud Security Benchmark to design and evaluate security posture
44
metadata:
5-
title: Evaluate security posture by using Microsoft Cloud Security Benchmark
6-
description: "SC-100 preparatory unit on the topic: evaluate security posture by using Microsoft Cloud Security Benchmark."
5+
title: Use the Microsoft Cloud Security Benchmark to design and evaluate security posture
6+
description: "SC-100 preparatory unit on the topic: use the Microsoft Cloud Security Benchmark to design and evaluate security posture."
77
ms.date: 02/05/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 4
11+
durationInMinutes: 5
1212
content: |
1313
[!include[](includes/2-evaluate-security-posture-microsoft-cloud-security-benchmark.md)]

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/3-design-integrated-posture-management-workload-protection.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-security-posture-management-hybrid-multicloud-environments.design-integrated-posture-management-workload-protection
3-
title: Design integrated posture management and workload protection with Microsoft Defender for Cloud
3+
title: Design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments
44
metadata:
5-
title: Design integrated posture management and workload protection with Microsoft Defender for Cloud
6-
description: "SC-100 preparatory unit on the topic: design integrated posture management and workload protection with Microsoft Defender for Cloud."
5+
title: Design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments
6+
description: "SC-100 preparatory unit on the topic: design integrated posture management solutions with Microsoft Defender for Cloud in hybrid and multicloud environments."
77
ms.date: 02/05/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/4-evaluate-security-posture-microsoft-defender-cloud.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-security-posture-management-hybrid-multicloud-environments.evaluate-security-posture-microsoft-defender-cloud
3-
title: Evaluate security posture by using Microsoft Defender for Cloud
3+
title: Evaluate security posture by using Microsoft Defender for Cloud, including Secure Score
44
metadata:
5-
title: Evaluate security posture by using Microsoft Defender for Cloud
6-
description: "SC-100 preparatory unit on the topic: evaluate security posture by using Microsoft Defender for Cloud."
5+
title: Evaluate security posture by using Microsoft Defender for Cloud, including Secure Score
6+
description: "SC-100 preparatory unit on the topic: evaluate security posture by using Microsoft Defender for Cloud, including Secure Score."
77
ms.date: 02/05/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/7-integrate-hybrid-multi-cloud-environments-azure-arc.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-security-posture-management-hybrid-multicloud-environments.integrate-hybrid-multi-cloud-environments-azure-arc
3-
title: Integrate hybrid and multicloud environments with Azure Arc
3+
title: Design a solution for integrating hybrid and multicloud environments by using Azure Arc
44
metadata:
5-
title: Integrate hybrid and multicloud environments with Azure Arc
6-
description: "SC-100 preparatory unit on the topic: Integrate hybrid and multicloud environments with Azure Arc."
5+
title: Design a solution for integrating hybrid and multicloud environments by using Azure Arc
6+
description: "SC-100 preparatory unit on the topic: Design a solution for integrating hybrid and multicloud environments by using Azure Arc."
77
ms.date: 02/05/2026
88
author: ceperezb
99
ms.author: ceperezb
Lines changed: 28 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,29 +1,37 @@
1-
Evaluating your organization's security posture requires a consistent framework that can be applied across Azure, AWS, GCP, and on-premises environments. The Microsoft Cloud Security Benchmark (MCSB) v2 serves as this evaluation framework, providing defined security controls you can measure your environment against.
1+
Designing and evaluating the security posture of hybrid and multicloud environments starts with selecting the right security framework. The Microsoft Cloud Security Benchmark (MCSB) provides a foundation for both designing your security architecture and evaluating your current posture against industry best practices.
22

3-
## Using MCSB to evaluate security posture
3+
## Designing with MCSB as your security framework
44

5-
MCSB enables you to evaluate security posture by comparing your current configurations and practices against defined security controls. This evaluation process helps you:
5+
MCSB serves as more than an evaluation checklist—it's a design framework that guides your security architecture decisions. When designing your posture management solution, consider how MCSB fits into your overall approach.
66

7-
- **Identify gaps**: Compare your current security configurations against MCSB control requirements to find areas that need improvement.
8-
- **Prioritize improvements**: Use MCSB's risk-based guidance to focus on controls that address your highest risks.
9-
- **Measure progress**: Track compliance against MCSB controls over time to demonstrate security posture improvement.
10-
- **Benchmark across clouds**: Apply the same evaluation criteria across Azure, AWS, and GCP since MCSB provides implementation guidance for each platform.
7+
**When to use MCSB as your primary baseline**: MCSB is appropriate as your primary security standard when:
8+
- Your organization operates across Azure, AWS, and GCP (MCSB provides implementation guidance for all three)
9+
- You need a comprehensive framework covering network, identity, data, and application security
10+
- You want alignment with industry frameworks without maintaining separate mappings
1111

12-
For security posture management specifically, MCSB provides the Posture and Vulnerability Management (PV) domain. These controls define what a mature security posture looks like and give you the criteria to evaluate against.
12+
**Mapping to regulatory requirements**: MCSB maps to common regulatory frameworks including PCI-DSS, ISO 27001, NIST SP 800-53, and CIS Controls. Design your compliance strategy by:
13+
- Using MCSB as the operational baseline
14+
- Mapping MCSB controls to your specific regulatory requirements
15+
- Identifying gaps where regulations require controls beyond MCSB
1316

14-
## MCSB controls for security posture evaluation
17+
**Designing exception management**: Not all MCSB controls apply to every workload. Design an exception process that documents:
18+
- Which controls don't apply and why
19+
- Compensating controls in place
20+
- Review cadence for exceptions
1521

16-
The PV domain contains seven controls that serve as evaluation criteria for your security posture. Use the following table to assess your environment's alignment with each control:
22+
## Evaluating posture against MCSB
1723

18-
| Control | What to evaluate | Questions to ask |
19-
|---------|------------------|------------------|
20-
| PV-1: Define and establish secure configurations | Whether security configuration baselines exist for each resource type and are applied during deployment. | Do you have documented baselines? Are configurations enforced at deployment time? |
21-
| PV-2: Audit and enforce secure configurations | Whether you continuously monitor for configuration drift and can enforce compliance across environments. | Can you detect when configurations change? Do you have remediation policies in place? |
22-
| PV-3: Define secure configurations for compute | Whether VMs and containers are deployed from hardened images with defined security baselines. | Are you using hardened images? Are OS security baselines defined and documented? |
23-
| PV-4: Audit and enforce compute configurations | Whether compute resources are monitored for configuration deviations with automated remediation. | Do you have visibility into compute configuration drift across all cloud providers? |
24-
| PV-5: Perform vulnerability assessments | Whether regular vulnerability scans cover all resource types with tracked remediation. | Are scans scheduled regularly? Do you have a centralized view of findings across clouds? |
25-
| PV-6: Remediate vulnerabilities automatically | Whether patches and updates are deployed automatically using risk-based prioritization. | Is patching automated? Are critical vulnerabilities prioritized appropriately? |
26-
| PV-7: Conduct red team operations | Whether penetration testing and red team exercises validate your security controls. | Do you conduct regular security testing? Are findings tracked to remediation? |
24+
With your design in place, use MCSB to evaluate your current security posture. The Posture and Vulnerability Management (PV) domain defines what mature posture management looks like:
25+
26+
| Control | Evaluation criteria | Design questions |
27+
|---------|---------------------|------------------|
28+
| PV-1: Define secure configurations | Security baselines exist for each resource type | Do you have documented baselines enforced at deployment? |
29+
| PV-2: Audit and enforce configurations | Continuous monitoring detects drift | Can you detect configuration changes with automated remediation? |
30+
| PV-3: Define compute configurations | VMs and containers deploy from hardened images | Are OS security baselines defined and documented? |
31+
| PV-4: Audit compute configurations | Compute resources monitored for deviations | Do you have visibility across all cloud providers? |
32+
| PV-5: Perform vulnerability assessments | Regular scans cover all resource types | Do you have centralized findings across clouds? |
33+
| PV-6: Remediate vulnerabilities | Patches deploy using risk-based prioritization | Is patching automated with critical vulnerabilities prioritized? |
34+
| PV-7: Conduct red team operations | Penetration testing validates controls | Are findings tracked to remediation? |
2735

2836
## Conducting an MCSB-based evaluation
2937

@@ -35,4 +43,4 @@ To evaluate your security posture using MCSB:
3543

3644
3. **Plan remediation**: Prioritize gaps based on risk and create a roadmap to address them, using MCSB's implementation guidance for your specific cloud platforms.
3745

38-
For detailed control requirements and platform-specific guidance, see [Posture and vulnerability management](/security/benchmark/azure/mcsb-posture-vulnerability-management) in the official MCSB documentation.
46+
For detailed control requirements and platform-specific guidance, see [Posture and vulnerability management](/security/benchmark/azure/mcsb-posture-vulnerability-management) in the MCSB documentation.

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/4-evaluate-security-posture-microsoft-defender-cloud.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ Secure score is Defender for Cloud's primary metric for evaluating security post
3434

3535
The Cloud Secure Score ranges from 0 to 100, with 100 indicating an optimal security posture. This model provides more accurate prioritization by factoring in contextual risk.
3636

37-
:::image type="content" source="../media/cloud-secure-score.png" alt-text="Screenshot of a the Cloud Secure Score and the Defender CSPM plan." lightbox="../media/cloud-secure-score.png":::
37+
:::image type="content" source="../media/cloud-secure-score.png" alt-text="Screenshot of the Cloud Secure Score and the Defender CSPM plan." lightbox="../media/cloud-secure-score.png":::
3838

3939
### How Cloud Secure Score works
4040

learn-pr/wwl-sci/design-solutions-security-posture-management-hybrid-multicloud-environments/includes/7-integrate-hybrid-multi-cloud-environments-azure-arc.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Design your resource hierarchy to support security governance:
8181

8282
## Addressing common design challenges
8383

84-
**Disconnected scenarios**: Arc-enabled servers require periodic connectivity to Azure (at least every 30 days by default). For occasionally-connected scenarios, plan for this requirement. Arc-enabled Kubernetes clusters support GitOps for configuration even during disconnection.
84+
**Disconnected scenarios**: Arc-enabled servers require periodic connectivity to Azure (at least every 30 days by default). For occasionally connected scenarios, plan for this requirement. Arc-enabled Kubernetes clusters support GitOps for configuration even during disconnection.
8585

8686
**Network segmentation**: If Arc resources exist in restricted network segments, aggregate traffic through proxies or deploy Arc gateway to minimize firewall openings.
8787

0 commit comments

Comments
 (0)