You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-secure-organization-data/includes/1-introduction-data-security.md
+2-17Lines changed: 2 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,23 +12,6 @@ Effective data security design follows Zero Trust principles: verify explicitly,
12
12
13
13
-**Automate protection where possible**: Manual processes don't scale. Use automation to consistently apply policies across your data estate.
14
14
15
-
## Microsoft Cloud Security Benchmark data protection controls
16
-
17
-
The [Microsoft Cloud Security Benchmark (MCSB)](/security/benchmark/azure/mcsb-v2-data-protection) provides eight data protection controls that guide your design decisions:
18
-
19
-
| Control | Description |
20
-
|---------|-------------|
21
-
|**DP-1**| Discover, classify, and label sensitive data |
22
-
|**DP-2**| Monitor anomalies and threats targeting sensitive data |
23
-
|**DP-3**| Encrypt sensitive data in transit |
24
-
|**DP-4**| Enable data at rest encryption by default |
25
-
|**DP-5**| Use customer-managed key option when required |
26
-
|**DP-6**| Use a secure key management process |
27
-
|**DP-7**| Use a secure certificate management process |
28
-
|**DP-8**| Ensure security of key and certificate repository |
29
-
30
-
Throughout this module, you learn how to evaluate and design solutions that address these controls using Microsoft security capabilities.
31
-
32
15
## Framework alignment for data security
33
16
34
17
When designing data security solutions, align your architecture with established frameworks:
@@ -39,4 +22,6 @@ When designing data security solutions, align your architecture with established
39
22
40
23
-**Microsoft Cybersecurity Reference Architecture (MCRA)**: Offers technical reference architectures showing how Microsoft security capabilities integrate for comprehensive data protection.
41
24
25
+
-**Microsoft Cloud Security Benchmark (MCSB)**: Defines eight [data protection controls](/security/benchmark/azure/mcsb-v2-data-protection) covering discovery, classification, encryption, and key management that guide your design decisions throughout this module.
26
+
42
27
These frameworks work together to help you design solutions that are secure, compliant, and operationally efficient.
0 commit comments