Skip to content

Commit a0de1f7

Browse files
committed
update for changes to Zero Trust
1 parent 335069e commit a0de1f7

9 files changed

Lines changed: 69 additions & 116 deletions

File tree

Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-microsoft-cybersecurity-cloud-security-benchmark.design-solutions-rapid-modernization-plan
3-
title: Design solutions that align to a Zero Trust rapid modernization plan
3+
title: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework
44
metadata:
5-
title: Design solutions that align to a Zero Trust rapid modernization plan
6-
description: "SC-100 preparatory content on topic: Design solutions that align to a Zero Trust rapid modernization plan (RaMP)."
7-
ms.date: 02/07/2026
5+
title: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework
6+
description: "SC-100 preparatory content on topic: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework."
7+
ms.date: 02/24/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 11
11+
durationInMinutes: 9
1212
content: |
1313
[!include[](includes/3b-design-solutions-rapid-modernization-plan.md)]

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/3b-design-solutions-rapid-modernization-plan.md

Lines changed: 39 additions & 51 deletions
Large diffs are not rendered by default.

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/2a-describe-frameworks.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@ metadata:
99
ms.author: ceperezb
1010
ms.topic: unit
1111
ai-usage: ai-generated
12-
durationInMinutes: 6
12+
durationInMinutes: 5
1313
content: |
1414
[!include[](includes/2a-describe-frameworks.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/3-zero-trust-initiatives.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the Zero Trust adoption framework and rapid modernization plan
44
metadata:
55
title: Describe the Zero Trust adoption framework and rapid modernization plan
66
description: "Describe the Zero Trust adoption framework and rapid modernization plan."
7-
ms.date: 02/11/2026
7+
ms.date: 02/26/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 6
11+
durationInMinutes: 4
1212
content: |
1313
[!include[](includes/3-zero-trust-initiatives.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/3a-describe-how-frameworks-relate.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ title: Describe how the frameworks relate to each other
44
metadata:
55
title: Describe How the Frameworks Relate to Each Other
66
description: "Learn how CAF, WAF, MCRA, MCSB, and the Zero Trust adoption framework work together as a comprehensive system for cybersecurity."
7-
ms.date: 02/11/2026
7+
ms.date: 02/26/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
1111
ai-usage: ai-generated
12-
durationInMinutes: 5
12+
durationInMinutes: 4
1313
content: |
1414
[!include[](includes/3a-describe-how-frameworks-relate.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/2a-describe-frameworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Microsoft provides several best practice frameworks that cybersecurity architects use to design and evaluate security across the organization. Each framework serves a different purpose and audience. Understanding the scope and intent of each framework helps you choose the right guidance for a given situation.
22

3-
## Cloud Adoption Framework
3+
## Microsoft Cloud Adoption Framework
44

55
The Microsoft Cloud Adoption Framework (CAF) is a structured roadmap that helps organizations successfully adopt Azure and integrate it into their existing IT environments. CAF provides best practices and guidance throughout the entire cloud adoption lifecycle.
66

Lines changed: 14 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,55 +1,31 @@
1-
Implementing Zero Trust across an organization is a major transformation. It requires a structured approach that goes beyond deploying individual technologies. Microsoft provides two complementary approaches: the Zero Trust adoption framework for strategic planning and the Rapid Modernization Plan (RaMP) for quick wins.
1+
Implementing Zero Trust across an organization is a major transformation that requires a structured approach beyond deploying individual technologies. The Zero Trust adoption framework provides strategic planning guidance for this transformation.
22

33
## Zero Trust adoption framework
44

5-
The Zero Trust adoption framework helps organizations plan and execute a Zero Trust strategy across their entire digital estate. It adapts the lifecycle phases from the Cloud Adoption Framework for Azure, but with a scope suited to Zero Trust.
5+
The Zero Trust adoption framework helps organizations plan and execute a Zero Trust strategy across their entire digital estate. It adapts the lifecycle phases from the Cloud Adoption Framework for Azure to the unique scope of Zero Trust—introducing new security configurations across an entire digital estate rather than onboarding individual workloads.
66

77
Adopting a Zero Trust strategy requires buy-in from across the C-suite. Security isn't the responsibility of one team—it's a shared business responsibility aligned to business outcomes. Each C-level role has a stake in Zero Trust, from the CEO who needs an integrated approach to security, to the CFO who needs measurable accountability for security spend.
88

9-
The Zero Trust adoption framework uses these lifecycle phases:
9+
The framework organizes adoption around a lifecycle with five phases:
1010

1111
| Phase | Description |
1212
|---|---|
1313
| **Define strategy** | Build a business case focused on the outcomes most closely aligned with your organization's risks and strategic goals. |
1414
| **Plan** | Prioritize quick wins and incremental progress. Structure coherent initiatives with clear outcomes, benefits, and ownership. |
15-
| **Ready** | Create a multilayer strategy for your Zero Trust deployment and prioritize early actions based on business needs. |
15+
| **Ready** | Evaluate, test, and pilot security configurations. Prioritize early actions based on business needs. |
1616
| **Adopt** | Incrementally implement the strategy across functional areas. |
17-
| **Govern** | Track and measure the success of your deployment. |
18-
| **Manage** | Use monitoring and detection technologies. Incrementally mature each functional area. |
17+
| **Govern and manage** | Track and measure the success of your deployment. Use monitoring and detection technologies to incrementally mature each functional area. |
1918

20-
:::image type="content" source="../media/zero-trust-adoption-framework.png" alt-text="Diagram showing the Zero Trust adoption framework lifecycle phases including Define strategy, Plan, Ready, Adopt, Govern, and Manage.":::
19+
:::image type="content" source="../media/zero-trust-adoption-framework.png" alt-text="Diagram showing the Zero Trust adoption framework lifecycle phases including Define strategy, Plan, Ready, Adopt, and Govern and manage.":::
2120

22-
### How it differs from the Cloud Adoption Framework
21+
### Business scenarios
2322

24-
The Cloud Adoption Framework focuses on introducing new apps and services into an organization, with a repeatable process for each workload added to the digital estate. Zero Trust adoption requires a different scope: introducing new security configurations across an entire digital estate.
23+
The framework applies the lifecycle through business scenarios that break work into concrete objectives. Each objective is a technical project that moves through the lifecycle independently, and you can stagger objectives so multiple workstreams progress in parallel. The framework includes these business scenarios:
2524

26-
The scale motion for Zero Trust is two-dimensional:
25+
- **Rapidly modernize your security posture** — Build the organizational capacity and basic security hygiene needed for every other scenario.
26+
- **Secure remote and hybrid work** — Apply Zero Trust protections to identities, devices, and applications for remote access.
27+
- **Identify and protect sensitive business data** — Discover, classify, and protect sensitive data across your digital estate.
28+
- **Prevent or reduce business damage from a breach** — Limit blast radius through segmentation, threat detection, and response capabilities.
29+
- **Meet regulatory and compliance requirements** — Align Zero Trust protections with regulatory frameworks and track compliance status.
2730

28-
1. Take a piece of the Zero Trust architecture, such as data protection, and scale it across the entire digital estate.
29-
2. Repeat the process with each additional piece of the Zero Trust architecture, starting with strategic quick wins and foundational elements, then advancing to more complex areas.
30-
31-
:::image type="content" source="../media/zero-trust-architecture.png" alt-text="Diagram showing the Zero Trust architecture with technology pillars scaled across the digital estate.":::
32-
33-
The Zero Trust adoption framework recommends building a strategy through business scenarios, including:
34-
35-
- Rapidly modernize your security posture.
36-
- Secure remote and hybrid work.
37-
- Identify and protect sensitive business data.
38-
- Prevent or reduce business damage from a breach.
39-
- Meet regulatory and compliance requirements.
40-
41-
## Zero Trust Rapid Modernization Plan
42-
43-
The Zero Trust Rapid Modernization Plan (RaMP) provides a set of deployment paths to quickly implement key layers of protection. RaMP takes a project management and checklist approach. It provides a suggested mapping of key stakeholders, implementers, and their accountabilities, along with checklists of deployment objectives and implementation steps.
44-
45-
Zero Trust is a major transformation, so it's critical to start with the most impactful items that deliver the most security and productivity gains with the least investment of time and resources.
46-
47-
The Zero Trust RaMP is included in the Microsoft Cybersecurity Reference Architectures (MCRA) and aligns to these recommended security modernization initiatives:
48-
49-
- **Secure identities and access:** Focus on using cloud-based security capabilities to rapidly modernize access control and increase both productivity and security assurances.
50-
- **Data security and governance, risk, compliance (GRC):** Focus on ensuring the organization can rapidly recover from a ransomware or extortion attack without paying attackers, and protect the most valuable business-critical data.
51-
- **Modern security operations:** Focus on streamlining responses to common attacks, getting end-to-end visibility across the enterprise, and automating manual tasks that slow down analysts.
52-
- **Infrastructure and development security:** Focus on security hygiene, reducing legacy risk, integrating security into DevOps and development processes, and applying microsegmentation concepts.
53-
- **Operational technology (OT) and Internet of Things (IoT) security:** Focus on quickly discovering, protecting, and monitoring these systems for attacks.
54-
55-
Together, the adoption framework and RaMP give you both the strategic planning structure and the tactical quick wins needed to make progress on your Zero Trust journey.
31+
The *Rapidly modernize your security posture* scenario is typically the starting point because it builds the organizational capacity—strategy alignment, risk assessment, security hygiene, and a repeatable adoption process—needed to systematically execute the other business scenarios. In turn, the other scenarios supply the technical objectives that feed through this process and accelerate the overall transformation.

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/3a-describe-how-frameworks-relate.md

Lines changed: 4 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -10,28 +10,17 @@ All of these frameworks share Zero Trust as a foundational security philosophy,
1010
- **MCSB** operates at the **control level**. It provides prescriptive security controls organized into domains, mapped to compliance standards. MCSB helps you decide *which specific controls to implement and monitor*.
1111
- **Zero Trust adoption framework** operates at the **strategy level**. It provides a phased business-driven approach to implementing Zero Trust across the organization. It helps you decide *how to plan and execute your Zero Trust transformation*.
1212

13-
## How the frameworks connect
14-
15-
The Microsoft cloud security benchmark draws from multiple sources, including the Cloud Adoption Framework and the Azure Well-Architected Framework, along with industry standards such as CIS, NIST, and PCI-DSS. When you implement MCSB controls, you're applying guidance that's already aligned with these broader frameworks.
16-
17-
CAF references WAF for workload-level design and optimization. When CAF guides you to adopt or govern workloads, WAF provides the detailed design principles for those individual workloads. Similarly, CAF's security methodology draws on MCRA for reference architecture guidance.
18-
19-
MCRA includes the Zero Trust RaMP, which prioritizes security modernization initiatives. These initiatives map to the Zero Trust technology pillars and provide the tactical steps that the Zero Trust adoption framework organizes into a broader strategic plan.
20-
21-
The Zero Trust adoption framework adapts CAF's lifecycle phases (Define strategy, Plan, Ready, Adopt, Govern, Manage) but applies them to security transformation across the entire digital estate rather than to individual workload adoption.
22-
2313
## Choosing the right framework
2414

2515
The following table summarizes when to use each framework:
2616

2717
| Framework | When to use | Primary audience |
2818
|---|---|---|
29-
| **CAF** | When you're looking to create and implement business and technology strategies for cloud adoption. | Cloud architects, IT professionals, business decision makers |
30-
| **WAF** | When you're looking to improve the quality of an individual cloud workload. | Cloud architects, IT professionals |
31-
| **MCRA** | When you need a starting template for security architecture, a comparison reference, or need to learn about Microsoft cybersecurity capabilities. | Cloud architects, IT professionals |
32-
| **MCSB** | When you need guidance on implementing specific security controls and monitoring compliance against industry standards. | Cloud architects, IT professionals |
19+
| **Microsoft Cloud Adoption Framework (CAF)** | When you're looking to create and implement business and technology strategies for cloud adoption. | Cloud architects, IT professionals, business decision makers |
20+
| **Azure Well-Architected Framework (WAF)** | When you're looking to improve the quality of an individual cloud workload. | Cloud architects, IT professionals |
21+
| **Microsoft Cybersecurity Reference Architectures (MCRA)** | When you need a starting template for security architecture, a comparison reference, or need to learn about Microsoft cybersecurity capabilities. | Cloud architects, IT professionals |
22+
| **Microsoft cloud security benchmark (MCSB)** | When you need guidance on implementing specific security controls and monitoring compliance against industry standards. | Cloud architects, IT professionals |
3323
| **Zero Trust adoption framework** | When you want a phased, business-driven approach to implementing Zero Trust from strategy through management. | Security architects, IT teams, project managers |
34-
| **Zero Trust RaMP** | When you want to get started with Zero Trust and make progress quickly by prioritizing the highest-impact areas. | Cloud architects, IT professionals, business decision makers |
3524

3625
## Think of it as a system
3726

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/index.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ uid: learn.wwl.introduction-zero-trust-best-practice-frameworks
33
metadata:
44
title: Introduction to Zero Trust and Best Practice Frameworks
55
description: "You learn about security best practices and antipatterns, the concept of Zero Trust and its guiding principles, and key best practice frameworks including CAF, WAF, MCRA, and MCSB. You also learn about the Zero Trust adoption framework and how the frameworks relate to each other."
6-
ms.date: 02/11/2026
6+
ms.date: 02/26/2026
77
author: ceperezb
88
ms.author: ceperezb
99
ms.topic: module

0 commit comments

Comments
 (0)