Skip to content

Commit a24196e

Browse files
committed
update pr
1 parent e5f54d4 commit a24196e

2 files changed

Lines changed: 9 additions & 9 deletions

File tree

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/5-summary.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-microsoft-cybersecurity-cloud-security-benchmark.summary
3-
title: Summary - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
3+
title: Summary
44
metadata:
5-
title: Summary - Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark
5+
title: Summary
66
description: "Summary of module: Design solution with Microsoft Cybersecurity Reference Architecture and Microsoft cloud security benchmark."
77
ms.date: 09/26/2024
88
author: ceperezb

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/2-design-solutions-best-practices-capabilities-controls.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ With this unified strategy in mind, let's break down the key security capability
44

55
The following best practices and MCSB controls are technology-agnostic security principles. Separate learning paths in the SC-100 training content cover specific Microsoft solutions (such as Microsoft Entra, Microsoft Defender, Microsoft Sentinel, and Microsoft Purview) that can be used to implement these best practices and controls.
66

7-
### Identity and Privileged Access
7+
### Identity and privileged Access
88

99
Identity is the foundation of Zero Trust security. A centralized identity provider serves as the policy engine for access decisions. Key practices include:
1010

@@ -23,7 +23,7 @@ Identity is the foundation of Zero Trust security. A centralized identity provid
2323
| [PA-3](/security/benchmark/azure/mcsb-privileged-access#pa-3-manage-lifecycle-of-identities-and-entitlements) | Manage lifecycle of identities and entitlements |
2424
| [PA-8](/security/benchmark/azure/mcsb-privileged-access#pa-8-determine-access-process-for-cloud-provider-support) | Determine access process for cloud provider support |
2525

26-
### Endpoint and Device Security
26+
### Endpoint and device Security
2727

2828
Zero Trust requires continuous verification of device security posture. Key practices include:
2929

@@ -40,7 +40,7 @@ Zero Trust requires continuous verification of device security posture. Key prac
4040
| [PV-3](/security/benchmark/azure/mcsb-posture-vulnerability-management#pv-3-define-and-establish-secure-configurations-for-compute-resources) | Define and establish secure configurations for compute resources |
4141
| [PV-5](/security/benchmark/azure/mcsb-posture-vulnerability-management#pv-5-perform-vulnerability-assessments) | Perform vulnerability assessments |
4242

43-
### Network and Infrastructure Security
43+
### Network and infrastructure Security
4444

4545
Network controls remain essential for defense-in-depth and breach containment. Key practices include:
4646

@@ -59,7 +59,7 @@ Network controls remain essential for defense-in-depth and breach containment. K
5959
| [NS-10](/security/benchmark/azure/mcsb-network-security#ns-10-ensure-domain-name-system-dns-security) | Ensure Domain Name System (DNS) security |
6060
| [LT-1](/security/benchmark/azure/mcsb-logging-threat-detection#lt-1-enable-threat-detection-capabilities) | Enable threat detection capabilities |
6161

62-
### Application Security and DevOps
62+
### Application security and DevOps
6363

6464
Applications and DevOps pipelines must be secured to prevent vulnerabilities. Key practices include:
6565

@@ -79,7 +79,7 @@ Applications and DevOps pipelines must be secured to prevent vulnerabilities. Ke
7979
| [DP-3](/security/benchmark/azure/mcsb-data-protection#dp-3-encrypt-sensitive-data-in-transit) | Encrypt sensitive data in transit |
8080
| [DP-4](/security/benchmark/azure/mcsb-data-protection#dp-4-enable-data-at-rest-encryption-by-default) | Enable data at rest encryption by default |
8181

82-
### Data Protection and Governance
82+
### Data protection and governance
8383

8484
Security is ultimately about protecting data. Key practices include:
8585

@@ -100,7 +100,7 @@ Security is ultimately about protecting data. Key practices include:
100100
| [BR-1](/security/benchmark/azure/mcsb-backup-recovery#br-1-ensure-regular-automated-backups) | Ensure regular automated backups |
101101
| [BR-2](/security/benchmark/azure/mcsb-backup-recovery#br-2-protect-backup-and-recovery-data) | Protect backup and recovery data |
102102

103-
### Threat Detection and Response
103+
### Threat detection and response
104104

105105
Assume breach and build robust detection and response capabilities. Key practices include:
106106

@@ -120,7 +120,7 @@ Assume breach and build robust detection and response capabilities. Key practice
120120
| [IR-5](/security/benchmark/azure/mcsb-incident-response#ir-5-detection-and-analysis--prioritize-incidents) | Detection and analysis – prioritize incidents |
121121
| [IR-6](/security/benchmark/azure/mcsb-incident-response#ir-6-containment-eradication-and-recovery--automate-the-incident-handling) | Containment, eradication, and recovery – automate the incident handling |
122122

123-
### Security Posture Management and Compliance
123+
### Security posture management and compliance
124124

125125
Maintain and improve security posture continuously. Key practices include:
126126

0 commit comments

Comments
 (0)