You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/2-design-solutions-best-practices-capabilities-controls.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ With this unified strategy in mind, let's break down the key security capability
4
4
5
5
The following best practices and MCSB controls are technology-agnostic security principles. Separate learning paths in the SC-100 training content cover specific Microsoft solutions (such as Microsoft Entra, Microsoft Defender, Microsoft Sentinel, and Microsoft Purview) that can be used to implement these best practices and controls.
6
6
7
-
### Identity and Privileged Access
7
+
### Identity and privileged Access
8
8
9
9
Identity is the foundation of Zero Trust security. A centralized identity provider serves as the policy engine for access decisions. Key practices include:
10
10
@@ -23,7 +23,7 @@ Identity is the foundation of Zero Trust security. A centralized identity provid
23
23
|[PA-3](/security/benchmark/azure/mcsb-privileged-access#pa-3-manage-lifecycle-of-identities-and-entitlements)| Manage lifecycle of identities and entitlements |
24
24
|[PA-8](/security/benchmark/azure/mcsb-privileged-access#pa-8-determine-access-process-for-cloud-provider-support)| Determine access process for cloud provider support |
25
25
26
-
### Endpoint and Device Security
26
+
### Endpoint and device Security
27
27
28
28
Zero Trust requires continuous verification of device security posture. Key practices include:
29
29
@@ -40,7 +40,7 @@ Zero Trust requires continuous verification of device security posture. Key prac
40
40
|[PV-3](/security/benchmark/azure/mcsb-posture-vulnerability-management#pv-3-define-and-establish-secure-configurations-for-compute-resources)| Define and establish secure configurations for compute resources |
0 commit comments