You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/0-introduction.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
This module covers designing security operations solutions in hybrid, multicloud, and edge environments. You learn about Microsoft's unified security operations platform that combines extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) capabilities.
1
+
This module covers designing security operations solutions in hybridand multicloud environments. You learn about Microsoft's unified security operations platform that combines extended detection and response (XDR), security information and event management (SIEM), and security orchestration, automation, and response (SOAR) capabilities.
2
2
3
-
Imagine you're a security architect in an organization operating across hybrid, multicloud, and edge environments. Your security operations center (SOC) faces challenges managing security consistently across different platforms while controlling costs and analyst workload. This module guides you through designing security operations solutions using Microsoft's unified approach.
3
+
Imagine you're a security architect in an organization operating across hybridand multicloud environments. Your security operations center (SOC) faces challenges managing security consistently across different platforms while controlling costs and analyst workload. This module guides you through designing security operations solutions using Microsoft's unified approach.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/1-introduction-security-operations-secops.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ The primary objective of a cloud security operations (SecOps) function is to det
4
4
- Reactively respond to attacks detected by tools
5
5
- Proactively hunt for attacks that slipped past reactive detections
6
6
7
-
The Microsoft Cybersecurity Reference Architecture (MCRA) provides guidance for designing end-to-end security using Zero Trust principles. The MCRA includes detailed diagrams for security operations (SecOps/SOC), helping organizations plan unified operations across hybrid and multicloud environments.
7
+
[The Microsoft Cybersecurity Reference Architecture (MCRA)](https://aka.ms/MCRA) provides guidance for designing end-to-end security using Zero Trust principles and includes detailed diagrams for security operations (SecOps/SOC), helping organizations plan unified operations across hybrid and multicloud environments.
8
8
9
9
## Security operations strategy overview
10
10
@@ -18,7 +18,6 @@ Modern security operations platforms address this challenge by integrating SIEM,
18
18
19
19
## Security operations functions
20
20
21
-
22
21
Security operations teams often focus on three key outcomes:
23
22
24
23
-**Incident management:** Manage active attacks on the environment, including:
@@ -36,7 +35,6 @@ To deliver against these outcomes, security operations teams should be structure
Detecting and responding to threats is currently undergoing significant modernization at all levels.
@@ -46,8 +44,10 @@ Detecting and responding to threats is currently undergoing significant moderniz
46
44
-**Responsiveness** via mean time to acknowledge (MTTA).
47
45
-**Remediation speed** via mean time to remediate (MTTR).
48
46
-**Technology evolution:** SOC technology is evolving from exclusive use of static analysis of logs in a SIEM to add the use of specialized tooling and sophisticated analysis techniques. This provides deep insights into assets that provide high quality alerts and investigation experience that complement the breadth view of the SIEM. Both types of tooling are increasingly using AI and machine learning, behavior analytics, and integrated threat intelligence to help spot and prioritize anomalous actions that could be a malicious attacker.
47
+
-**AI-assisted security operations:** Generative AI is transforming how SOC analysts work by accelerating investigation and response. AI copilots help analysts quickly summarize incidents, correlate alerts across data sources, generate investigation queries using natural language, and recommend response actions. This assistance reduces the expertise barrier for junior analysts, helps experienced analysts work faster, and enables teams to handle higher alert volumes without proportional staffing increases.
49
48
-**Threat hunting:** SOCs are adding hypothesis driven threat hunting to proactively identify advanced attackers and shift noisy alerts out of frontline analyst queues.
50
-
-**Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams. **Integration of internal context:** To help prioritize SOC activities such as the relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to closely defend.
49
+
-**Incident management:** Discipline is becoming formalized to coordinate nontechnical elements of incidents with legal, communications, and other teams.
50
+
-**Integration of internal context:** SOCs are incorporating business context to prioritize activities, including relative risk scores of user accounts and devices, sensitivity of data and applications, and key security isolation boundaries to defend.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-security-operations/includes/2-design-security-operations-capabilities-hybrid-multicloud-environments.md
+10-4Lines changed: 10 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -99,7 +99,14 @@ This centralized visibility eliminates the need for security teams to switch bet
99
99
100
100
### Workspace architecture decisions
101
101
102
-
As a cybersecurity architect, one of your key decisions is workspace topology. Consider these patterns:
102
+
As a cybersecurity architect, one of your key decisions is workspace topology. This decision directly impacts your monitoring effectiveness because:
103
+
104
+
-**Threat correlation** - Security analysts need to correlate events across identities, endpoints, and network traffic. Data in separate workspaces requires cross-workspace queries, which are slower and more complex.
105
+
-**Alert context** - When an alert fires, analysts need surrounding context from related logs. Fragmented workspaces mean analysts may miss critical context during investigations.
106
+
-**Detection rules** - Analytics rules and detection logic work most efficiently when all relevant data sources are in the same workspace.
107
+
-**Cost efficiency** - Commitment tier pricing applies per workspace, so consolidation can reduce costs, but data egress charges may offset savings if sources are geographically dispersed.
108
+
109
+
Consider these patterns:
103
110
104
111
| Pattern | When to use | Trade-offs |
105
112
|---------|-------------|------------|
@@ -111,14 +118,13 @@ For most hybrid and multicloud scenarios, a primary workspace with Azure Lightho
111
118
112
119
### Agent deployment strategy at scale
113
120
114
-
Design your agent deployment approach based on environment characteristics:
121
+
Deploying the Azure Monitor agent consistently across hybrid environments ensures complete monitoring coverage. For non-Azure machines, the Azure Arc agent must be installed first to enable Azure Monitor agent deployment. Design your agent deployment approach based on environment characteristics:
115
122
116
123
-**Azure Policy with remediation tasks** - Automatically deploy Azure Monitor agent to Arc-enabled servers that don't have it installed. Best for enforcing consistent monitoring across large estates.
117
124
-**Defender for Cloud auto-provisioning** - Automatically deploys Arc agent and monitoring extensions to AWS EC2 and GCP VM instances when connectors are configured. Simplifies multicloud onboarding.
118
-
-**Configuration management tools** - Use Ansible, Puppet, or DSC for environments with existing automation. Provides flexibility but requires maintenance.
119
125
120
126
> [!TIP]
121
-
> Use Azure Resource Graph queries to identify monitoring coverage gaps—resources that are Arc-enabled but missing the Azure Monitor agent or required data collection rules.
127
+
> Use Azure Resource Graph queries to identify monitoring coverage gaps—resources that are Arc-enabled but missing the Azure Monitor agent or required data collection rules. For sample queries, see [Azure Resource Graph sample queries for Azure Arc-enabled servers](/azure/azure-arc/servers/resource-graph-samples).
0 commit comments