Skip to content

Commit 6c1e82b

Browse files
Merge pull request #53436 from ceperezb/CEPEREZB-sc100-zero-trust-and-frameworks
update module
2 parents 2692b5a + 00a38fa commit 6c1e82b

33 files changed

Lines changed: 348 additions & 375 deletions

learn-pr/wwl-sci/.openpublishing.redirection.wwl-sci.json

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -752,6 +752,16 @@
752752
"source_path_from_root": "/learn-pr/wwl-sci/design-solutions-secure-applications/5-design-security-lifecycle-strategy-applications.yml",
753753
"redirect_url": "/training/modules/design-solutions-secure-applications/2a-design-full-lifecycle-strategy-application-security",
754754
"redirect_document_id": false
755+
},
756+
{
757+
"source_path_from_root": "/learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/4-zero-trust-technology-pillars-1.yml",
758+
"redirect_url": "/training/modules/introduction-zero-trust-best-practice-frameworks/2-introduction-zero-trust",
759+
"redirect_document_id": false
760+
},
761+
{
762+
"source_path_from_root": "/learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/5-zero-trust-technology-pillars-2.yml",
763+
"redirect_url": "/training/modules/introduction-zero-trust-best-practice-frameworks/2-introduction-zero-trust",
764+
"redirect_document_id": false
755765
}
756766
]
757767
}
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.introduction
3+
title: Introduction
4+
metadata:
5+
title: Introduction
6+
description: "Introduction to the module on Zero Trust and best practice frameworks for cybersecurity architects."
7+
ms.date: 02/11/2026
8+
author: ceperezb
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 2
13+
content: |
14+
[!include[](includes/0-introduction.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/1-introduction-best-practices.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.introduction-best-practices
3-
title: Introduction to best practices
3+
title: Describe antipatterns and best practices
44
metadata:
5-
title: Introduction to best practices
6-
description: "SC-100 preparatory unit on the topic: Introduction to best practices."
7-
ms.date: 09/26/2024
5+
title: Describe antipatterns and best practices
6+
description: "Describe antipatterns and best practices."
7+
ms.date: 02/11/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/2-introduction-zero-trust.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,10 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.introduction-zero-trust
3-
title: Introduction to Zero Trust
3+
title: Describe the concept of Zero Trust
44
metadata:
5-
title: Introduction to Zero Trust
6-
description: "SC-100 preparatory unit on the topic: Introduction to Zero Trust."
7-
ms.date: 09/26/2024
5+
title: Describe the concept of Zero Trust
6+
description: "Describe the concept of Zero Trust."
7+
ms.date: 02/11/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.describe-frameworks
3+
title: Describe the frameworks
4+
metadata:
5+
title: Describe the Frameworks
6+
description: "Learn about the Cloud Adoption Framework, the Azure Well-Architected Framework, the Microsoft Cybersecurity Reference Architectures, and the Microsoft cloud security benchmark."
7+
ms.date: 02/11/2026
8+
author: ceperezb
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 6
13+
content: |
14+
[!include[](includes/2a-describe-frameworks.md)]
Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.zero-trust-initiatives
3-
title: Zero Trust initiatives
3+
title: Describe the Zero Trust adoption framework and rapid modernization plan
44
metadata:
5-
title: Zero Trust initiatives
6-
description: "SC-100 preparatory unit on the topic: Zero Trust initiatives."
7-
ms.date: 09/26/2024
5+
title: Describe the Zero Trust adoption framework and rapid modernization plan
6+
description: "Describe the Zero Trust adoption framework and rapid modernization plan."
7+
ms.date: 02/11/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 5
11+
durationInMinutes: 6
1212
content: |
1313
[!include[](includes/3-zero-trust-initiatives.md)]
Lines changed: 14 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
### YamlMime:ModuleUnit
2+
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.describe-how-frameworks-relate
3+
title: Describe how the frameworks relate to each other
4+
metadata:
5+
title: Describe How the Frameworks Relate to Each Other
6+
description: "Learn how CAF, WAF, MCRA, MCSB, and the Zero Trust adoption framework work together as a comprehensive system for cybersecurity."
7+
ms.date: 02/11/2026
8+
author: ceperezb
9+
ms.author: ceperezb
10+
ms.topic: unit
11+
ai-usage: ai-generated
12+
durationInMinutes: 5
13+
content: |
14+
[!include[](includes/3a-describe-how-frameworks-relate.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/4-zero-trust-technology-pillars-1.yml

Lines changed: 0 additions & 13 deletions
This file was deleted.

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/5-zero-trust-technology-pillars-2.yml

Lines changed: 0 additions & 13 deletions
This file was deleted.

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/6-knowledge-check.yml

Lines changed: 42 additions & 45 deletions
Original file line numberDiff line numberDiff line change
@@ -2,17 +2,12 @@
22
uid: learn.wwl.introduction-zero-trust-best-practice-frameworks.knowledge-check
33
title: Module assessment
44
metadata:
5-
hidden_question_numbers: ["944F9AAF_22","944F9AAF_34","944F9AAF_79","944F9AAF_87"]
6-
ai_generated_module_assessment: true
75
title: Module assessment
86
description: "Knowledge check for module on the topic: Introduction to Zero Trust and best practice frameworks."
9-
ms.date: 09/26/2024
7+
ms.date: 02/11/2026
108
author: ceperezb
119
ms.author: ceperezb
1210
ms.topic: unit
13-
content_well_notification:
14-
- AI-contribution
15-
ai-usage: ai-assisted
1611
module_assessment: true
1712
durationInMinutes: 3
1813
###########################################################################
@@ -32,56 +27,58 @@ durationInMinutes: 3
3227
content: |
3328
quiz:
3429
questions:
35-
- content: "What is the core principle of Zero Trust security?"
30+
- content: "Which of the following best describes an antipattern in cybersecurity?"
3631
choices:
37-
- content: "Assume everything inside the network is safe"
38-
isCorrect: false
39-
explanation: "The core principle of Zero Trust is to assume nothing inside or outside the network is safe and to verify every access request."
40-
- content: "Assume nothing inside or outside the network is safe and verify every access request"
41-
isCorrect: true
42-
explanation: "The core principle of Zero Trust is to assume nothing inside or outside the network is safe and to verify every access request."
43-
- content: "Allow all access requests by default"
44-
isCorrect: false
45-
explanation: "Zero Trust does not allow all access requests by default, but verifies every access request."
46-
- content: "Only allow access requests from trusted sources"
47-
isCorrect: false
48-
explanation: "Zero Trust does not only allow access requests from trusted sources, but verifies every access request."
49-
- content: "What does the Zero Trust Rapid Modernization Plan (RaMP) aim to do?"
50-
choices:
51-
- content: "Rapidly migrate all network traffic to a Zero Trust architecture"
32+
- content: "A recommended approach that has been found to be most effective"
5233
isCorrect: false
53-
explanation: "The Zero Trust RaMP does not aim to rapidly migrate all network traffic to a Zero Trust architecture, but rather to provide a structured approach to implement Zero Trust principles in phases."
54-
- content: "Provide a structured approach to implement Zero Trust principles in phases"
34+
explanation: "A recommended approach that has been found to be most effective describes a best practice, not an antipattern. An antipattern is a common mistake that leads to negative outcomes."
35+
- content: "A common mistake that leads to negative security outcomes"
5536
isCorrect: true
56-
explanation: "The Zero Trust RaMP aims to provide a structured approach to implement Zero Trust principles in phases, rather than rapidly migrating all network traffic to a Zero Trust architecture."
57-
- content: "Implement a single Zero Trust solution for all security needs"
37+
explanation: "An antipattern is a common mistake that leads to negative outcomes. It's the opposite of a best practice. Many best practices are designed to help organizations avoid antipatterns."
38+
- content: "A security control that monitors compliance against industry standards"
39+
isCorrect: false
40+
explanation: "Monitoring compliance against industry standards describes a function of the Microsoft cloud security benchmark, not an antipattern. An antipattern is a common mistake that leads to negative outcomes."
41+
- content: "What are the three guiding principles of Zero Trust?"
42+
choices:
43+
- content: "Confidentiality, integrity, and availability"
5844
isCorrect: false
59-
explanation: "The Zero Trust RaMP does not aim to implement a single Zero Trust solution for all security needs, but rather to provide a structured approach to implement Zero Trust principles in phases."
60-
- content: "Reduce the number of security controls to simplify the security architecture"
45+
explanation: "Confidentiality, integrity, and availability are the CIA triad of information security. The three guiding principles of Zero Trust are verify explicitly, use least privilege access, and assume breach."
46+
- content: "Verify explicitly, use least privilege access, and assume breach"
47+
isCorrect: true
48+
explanation: "The three guiding principles of Zero Trust are verify explicitly, use least privilege access, and assume breach. These principles form the foundation of the Zero Trust security strategy."
49+
- content: "Authenticate users, encrypt data, and segment networks"
6150
isCorrect: false
62-
explanation: "The Zero Trust RaMP does not aim to reduce the number of security controls to simplify the security architecture, but rather to provide a structured approach to implement Zero Trust principles in phases."
63-
- content: "What is the purpose of the Secure Data with Zero Trust initiative?"
51+
explanation: "While these are important security practices, they aren't the three guiding principles of Zero Trust. The correct principles are verify explicitly, use least privilege access, and assume breach."
52+
- content: "Which framework provides prescriptive security controls organized into security domains and mapped to industry compliance standards like CIS, NIST, and PCI-DSS?"
6453
choices:
65-
- content: "To ensure data is encrypted at rest and in transit"
54+
- content: "The Cloud Adoption Framework (CAF)"
6655
isCorrect: false
67-
explanation: "While encryption is a part of securing data with Zero Trust, the initiative is broader and aims to protect data through measures such as data classification, access controls, and auditing."
68-
- content: "To implement a secure data center"
56+
explanation: "CAF is a structured roadmap for cloud adoption, not a controls-based compliance framework. The Microsoft cloud security benchmark (MCSB) provides prescriptive security controls mapped to industry standards."
57+
- content: "The Azure Well-Architected Framework (WAF)"
6958
isCorrect: false
70-
explanation: "The Secure Data with Zero Trust initiative is not specifically aimed at implementing a secure data center, but rather at protecting data through measures such as data classification, access controls, and auditing."
71-
- content: "To protect data through data classification, access controls, and auditing"
59+
explanation: "WAF is a design framework focused on improving workload quality across five pillars. The Microsoft cloud security benchmark (MCSB) provides prescriptive security controls mapped to industry standards."
60+
- content: "The Microsoft cloud security benchmark (MCSB)"
7261
isCorrect: true
73-
explanation: "The purpose of the Secure Data with Zero Trust initiative is to protect data through measures such as data classification, access controls, and auditing. While encryption is a part of securing data with Zero Trust, the initiative is broader and aimed at ensuring that data is protected at all times."
74-
- content: "What is the role of automation and orchestration in implementing Zero Trust security?"
62+
explanation: "MCSB provides prescriptive best practices and recommendations for cloud security, with controls mapped to industry standards such as CIS, NIST, and PCI-DSS."
63+
- content: "How does the Zero Trust adoption framework differ from the Cloud Adoption Framework in its approach to scaling?"
7564
choices:
76-
- content: "To replace human decision-making and intervention"
65+
- content: "It introduces new security configurations across an entire digital estate rather than introducing new apps and services one at a time."
66+
isCorrect: true
67+
explanation: "The Cloud Adoption Framework focuses on introducing new apps into an organization, with a repeatable process for each workload. The Zero Trust adoption framework introduces new security configurations across the entire digital estate, scaling in two dimensions."
68+
- content: "It focuses exclusively on Azure workloads while the Cloud Adoption Framework covers multicloud environments."
69+
isCorrect: false
70+
explanation: "The Zero Trust adoption framework applies across the entire digital estate, not just Azure workloads. Its key difference from CAF is that it introduces security configurations across all assets rather than adding individual apps and services."
71+
- content: "It replaces the Cloud Adoption Framework with a faster deployment methodology."
7772
isCorrect: false
78-
explanation: "Automation and orchestration do not aim to replace human decision-making and intervention, but rather to streamline security processes and enable faster response times."
79-
- content: "To increase the complexity of security processes"
73+
explanation: "The Zero Trust adoption framework doesn't replace CAF. It adapts CAF's lifecycle phases for security transformation. Both frameworks can be used together for complementary purposes."
74+
- content: "At which level does the Azure Well-Architected Framework (WAF) primarily operate?"
75+
choices:
76+
- content: "The organizational and strategy level"
8077
isCorrect: false
81-
explanation: "Automation and orchestration do not aim to increase the complexity of security processes, but rather to streamline security operations and make them more efficient."
82-
- content: "To streamline security processes and enable faster response times"
78+
explanation: "The organizational and strategy level describes the Cloud Adoption Framework (CAF) or the Zero Trust adoption framework. WAF operates at the workload level, helping teams improve individual workload quality."
79+
- content: "The workload level"
8380
isCorrect: true
84-
explanation: "The role of automation and orchestration in implementing Zero Trust security is to streamline security operations, enable faster response times, and reduce the risk of human error by automating repetitive tasks and providing a centralized view of security data."
85-
- content: "To replace all security tools with automated solutions"
81+
explanation: "WAF operates at the workload level. It helps teams responsible for improving individual workloads and addressing cross-cutting design concerns across five pillars: Reliability, Security, Cost Optimization, Operational Excellence, and Performance Efficiency."
82+
- content: "The security control and compliance level"
8683
isCorrect: false
87-
explanation: "Automation and orchestration do not aim to replace all security tools with automated solutions, but rather to integrate and orchestrate existing security tools and processes."
84+
explanation: "The security control and compliance level describes the Microsoft cloud security benchmark (MCSB). WAF operates at the workload level, focusing on design quality across five pillars."

0 commit comments

Comments
 (0)