Skip to content

Commit b9d29a8

Browse files
Merge pull request #53598 from ceperezb/CEPEREZB-sc100-zero-trust
fix header
2 parents 657cca4 + ee57979 commit b9d29a8

13 files changed

Lines changed: 74 additions & 132 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-microsoft-cybersecurity-cloud-security-benchmark.design-solutions-rapid-modernization-plan
3-
title: Design solutions that align to a Zero Trust rapid modernization plan
3+
title: Design solutions that align with the Zero Trust adoption framework
44
metadata:
5-
title: Design solutions that align to a Zero Trust rapid modernization plan
6-
description: "SC-100 preparatory content on topic: Design solutions that align to a Zero Trust rapid modernization plan (RaMP)."
7-
ms.date: 02/07/2026
5+
title: Design solutions that align with the Zero Trust adoption framework
6+
description: "SC-100 preparatory content on topic: Design solutions that align with the Zero Trust adoption framework."
7+
ms.date: 02/24/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 11
11+
durationInMinutes: 9
1212
content: |
1313
[!include[](includes/3b-design-solutions-rapid-modernization-plan.md)]

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/0-introduction.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,6 @@ In this module, you learn how to:
1010

1111
- Use the Microsoft Cybersecurity Reference Architecture (MCRA) to design more secure solutions.
1212
- Use Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.
13-
- Design solutions with best practices for security capabilities and controls.
14-
- Design solutions for protecting against insider threats, external attacks, and supply chain attacks.
15-
- Design AI solutions that align to the Microsoft Cloud Security Benchmark.
16-
- Design solutions to align to a Zero Trust rapid modernization plan.
17-
18-
The content in the module helps you prepare for the certification exam SC-100: Microsoft Cybersecurity Architect.
1913

2014
## Prerequisites
2115

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/3b-design-solutions-rapid-modernization-plan.md

Lines changed: 39 additions & 51 deletions
Large diffs are not rendered by default.

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/5-summary.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ You also learned how to design solutions that protect against three distinct thr
44

55
You explored AI security and its three core pillars: AI platform security, AI application security, and monitoring and response. The MCSB v2 AI controls (AI-1 through AI-7) provide a framework for addressing AI-specific risks like model theft, prompt injection, and adversarial attacks.
66

7-
Finally, you learned about the Zero Trust Rapid Modernization Plan (RaMP), which provides a prioritized approach to implementing Zero Trust. RaMP focuses on high-impact initiatives—identity protection, privileged access security, and data protection—that reduce risk quickly while building toward comprehensive Zero Trust adoption.
7+
Finally, you learned about the Zero Trust cloud adoption framework, which provides a methodical approach to implementing Zero Trust across your digital estate and can help accelerate adoption.
88

99
The main takeaways from this module are:
1010

@@ -18,10 +18,6 @@ In this module, you learned how to:
1818

1919
- Use the Microsoft Cybersecurity Reference Architecture (MCRA) to design more secure solutions.
2020
- Use Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.
21-
- Design solutions with best practices for security capabilities and controls.
22-
- Design solutions for protecting against insider threats, external attacks, and supply chain attacks.
23-
- Design AI solutions that align to the Microsoft Cloud Security Benchmark.
24-
- Design solutions that align to a Zero Trust rapid modernization plan.
2521

2622
## Learn more with security documentation
2723

@@ -30,7 +26,6 @@ In this module, you learned how to:
3026
- [Overview of the Microsoft Cloud Security Benchmark](/security/benchmark/azure/overview)
3127
- [MCSB v2 AI Security Controls](/security/benchmark/azure/mcsb-v2-artificial-intelligence-security)
3228
- [Security for AI](/security/ai/)
33-
- [Zero Trust Rapid Modernization Plan](/security/zero-trust/zero-trust-ramp-overview)
3429
- [What is Zero Trust?](/security/zero-trust/zero-trust-overview)
3530
- [Zero Trust adoption framework overview](/security/zero-trust/adopt/zero-trust-adoption-overview)
3631
- [Rapidly modernize your security posture](/security/zero-trust/adopt/rapidly-modernize-security-posture)

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/2a-describe-frameworks.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,6 @@ metadata:
99
ms.author: ceperezb
1010
ms.topic: unit
1111
ai-usage: ai-generated
12-
durationInMinutes: 6
12+
durationInMinutes: 5
1313
content: |
1414
[!include[](includes/2a-describe-frameworks.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/3-zero-trust-initiatives.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,10 @@ title: Describe the Zero Trust adoption framework and rapid modernization plan
44
metadata:
55
title: Describe the Zero Trust adoption framework and rapid modernization plan
66
description: "Describe the Zero Trust adoption framework and rapid modernization plan."
7-
ms.date: 02/11/2026
7+
ms.date: 02/24/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 6
11+
durationInMinutes: 4
1212
content: |
1313
[!include[](includes/3-zero-trust-initiatives.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/3a-describe-how-frameworks-relate.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,11 +4,11 @@ title: Describe how the frameworks relate to each other
44
metadata:
55
title: Describe How the Frameworks Relate to Each Other
66
description: "Learn how CAF, WAF, MCRA, MCSB, and the Zero Trust adoption framework work together as a comprehensive system for cybersecurity."
7-
ms.date: 02/11/2026
7+
ms.date: 02/24/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
1111
ai-usage: ai-generated
12-
durationInMinutes: 5
12+
durationInMinutes: 4
1313
content: |
1414
[!include[](includes/3a-describe-how-frameworks-relate.md)]

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/0-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
As a cybersecurity architect, you're responsible for designing security strategies that protect your organization's digital estate. To do this effectively, you need to understand the best practice frameworks available to you and how they work together.
22

3-
This module introduces you to the concept of Zero Trust, common security antipatterns, and the key best practice frameworks that Microsoft provides for cybersecurity. You explore the Cloud Adoption Framework (CAF), the Azure Well-Architected Framework (WAF), the Microsoft Cybersecurity Reference Architectures (MCRA), and the Microsoft cloud security benchmark (MCSB). You also learn about the Zero Trust adoption framework and the rapid modernization approach.
3+
This module introduces you to the concept of Zero Trust, common security antipatterns, and the key best practice frameworks that Microsoft provides for cybersecurity. You explore the Cloud Adoption Framework (CAF), the Azure Well-Architected Framework (WAF), the Microsoft Cybersecurity Reference Architectures (MCRA), and the Microsoft cloud security benchmark (MCSB). You also learn about the Zero Trust adoption framework.
44

55
This module is the first in a series that makes up the Cybersecurity Architects training content. Later modules cover these frameworks in greater depth from a design and evaluation perspective. Here, the focus is on understanding what each framework is, what it provides, and when to use it.
66

@@ -11,7 +11,7 @@ By the end of this module, you're able to:
1111
- Describe common security antipatterns and the role of best practices for cybersecurity architects.
1212
- Describe the concept of Zero Trust and its guiding principles.
1313
- Describe the purpose and scope of CAF, WAF, MCRA, and MCSB.
14-
- Describe the Zero Trust adoption framework and the approach to rapid modernization.
14+
- Describe the Zero Trust adoption framework.
1515
- Describe how the different best practice frameworks relate to each other.
1616

1717
## Prerequisites

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/2a-describe-frameworks.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
Microsoft provides several best practice frameworks that cybersecurity architects use to design and evaluate security across the organization. Each framework serves a different purpose and audience. Understanding the scope and intent of each framework helps you choose the right guidance for a given situation.
22

3-
## Cloud Adoption Framework
3+
## Microsoft Cloud Adoption Framework
44

55
The Microsoft Cloud Adoption Framework (CAF) is a structured roadmap that helps organizations successfully adopt Azure and integrate it into their existing IT environments. CAF provides best practices and guidance throughout the entire cloud adoption lifecycle.
66

Lines changed: 14 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -1,55 +1,31 @@
1-
Implementing Zero Trust across an organization is a major transformation. It requires a structured approach that goes beyond deploying individual technologies. Microsoft provides two complementary approaches: the Zero Trust adoption framework for strategic planning and the Rapid Modernization Plan (RaMP) for quick wins.
1+
Implementing Zero Trust across an organization is a major transformation that requires a structured approach beyond deploying individual technologies. The Zero Trust adoption framework provides strategic planning guidance for this transformation.
22

33
## Zero Trust adoption framework
44

5-
The Zero Trust adoption framework helps organizations plan and execute a Zero Trust strategy across their entire digital estate. It adapts the lifecycle phases from the Cloud Adoption Framework for Azure, but with a scope suited to Zero Trust.
5+
The Zero Trust adoption framework helps organizations plan and execute a Zero Trust strategy across their entire digital estate. It adapts the lifecycle phases from the Cloud Adoption Framework for Azure to the unique scope of Zero Trust—introducing new security configurations across an entire digital estate rather than onboarding individual workloads.
66

77
Adopting a Zero Trust strategy requires buy-in from across the C-suite. Security isn't the responsibility of one team—it's a shared business responsibility aligned to business outcomes. Each C-level role has a stake in Zero Trust, from the CEO who needs an integrated approach to security, to the CFO who needs measurable accountability for security spend.
88

9-
The Zero Trust adoption framework uses these lifecycle phases:
9+
The framework organizes adoption around a lifecycle with five phases:
1010

1111
| Phase | Description |
1212
|---|---|
1313
| **Define strategy** | Build a business case focused on the outcomes most closely aligned with your organization's risks and strategic goals. |
1414
| **Plan** | Prioritize quick wins and incremental progress. Structure coherent initiatives with clear outcomes, benefits, and ownership. |
15-
| **Ready** | Create a multilayer strategy for your Zero Trust deployment and prioritize early actions based on business needs. |
15+
| **Ready** | Evaluate, test, and pilot security configurations. Prioritize early actions based on business needs. |
1616
| **Adopt** | Incrementally implement the strategy across functional areas. |
17-
| **Govern** | Track and measure the success of your deployment. |
18-
| **Manage** | Use monitoring and detection technologies. Incrementally mature each functional area. |
17+
| **Govern and manage** | Track and measure the success of your deployment. Use monitoring and detection technologies to incrementally mature each functional area. |
1918

20-
:::image type="content" source="../media/zero-trust-adoption-framework.png" alt-text="Diagram showing the Zero Trust adoption framework lifecycle phases including Define strategy, Plan, Ready, Adopt, Govern, and Manage.":::
19+
:::image type="content" source="../media/zero-trust-adoption-framework.png" alt-text="Diagram showing the Zero Trust adoption framework lifecycle phases including Define strategy, Plan, Ready, Adopt, and Govern and manage.":::
2120

22-
### How it differs from the Cloud Adoption Framework
21+
### Business scenarios
2322

24-
The Cloud Adoption Framework focuses on introducing new apps and services into an organization, with a repeatable process for each workload added to the digital estate. Zero Trust adoption requires a different scope: introducing new security configurations across an entire digital estate.
23+
The framework applies the lifecycle through business scenarios that break work into concrete objectives. Each objective is a technical project that moves through the lifecycle independently, and you can stagger objectives so multiple workstreams progress in parallel. The framework includes these business scenarios:
2524

26-
The scale motion for Zero Trust is two-dimensional:
25+
- **Rapidly modernize your security posture**: Build the organizational capacity and basic security hygiene needed for every other scenario.
26+
- **Secure remote and hybrid work**: Apply Zero Trust protections to identities, devices, and applications for remote access.
27+
- **Identify and protect sensitive business data**: Discover, classify, and protect sensitive data across your digital estate.
28+
- **Prevent or reduce business damage from a breach**: Limit blast radius through segmentation, threat detection, and response capabilities.
29+
- **Meet regulatory and compliance requirements**: Align Zero Trust protections with regulatory frameworks and track compliance status.
2730

28-
1. Take a piece of the Zero Trust architecture, such as data protection, and scale it across the entire digital estate.
29-
2. Repeat the process with each additional piece of the Zero Trust architecture, starting with strategic quick wins and foundational elements, then advancing to more complex areas.
30-
31-
:::image type="content" source="../media/zero-trust-architecture.png" alt-text="Diagram showing the Zero Trust architecture with technology pillars scaled across the digital estate.":::
32-
33-
The Zero Trust adoption framework recommends building a strategy through business scenarios, including:
34-
35-
- Rapidly modernize your security posture.
36-
- Secure remote and hybrid work.
37-
- Identify and protect sensitive business data.
38-
- Prevent or reduce business damage from a breach.
39-
- Meet regulatory and compliance requirements.
40-
41-
## Zero Trust Rapid Modernization Plan
42-
43-
The Zero Trust Rapid Modernization Plan (RaMP) provides a set of deployment paths to quickly implement key layers of protection. RaMP takes a project management and checklist approach. It provides a suggested mapping of key stakeholders, implementers, and their accountabilities, along with checklists of deployment objectives and implementation steps.
44-
45-
Zero Trust is a major transformation, so it's critical to start with the most impactful items that deliver the most security and productivity gains with the least investment of time and resources.
46-
47-
The Zero Trust RaMP is included in the Microsoft Cybersecurity Reference Architectures (MCRA) and aligns to these recommended security modernization initiatives:
48-
49-
- **Secure identities and access:** Focus on using cloud-based security capabilities to rapidly modernize access control and increase both productivity and security assurances.
50-
- **Data security and governance, risk, compliance (GRC):** Focus on ensuring the organization can rapidly recover from a ransomware or extortion attack without paying attackers, and protect the most valuable business-critical data.
51-
- **Modern security operations:** Focus on streamlining responses to common attacks, getting end-to-end visibility across the enterprise, and automating manual tasks that slow down analysts.
52-
- **Infrastructure and development security:** Focus on security hygiene, reducing legacy risk, integrating security into DevOps and development processes, and applying microsegmentation concepts.
53-
- **Operational technology (OT) and Internet of Things (IoT) security:** Focus on quickly discovering, protecting, and monitoring these systems for attacks.
54-
55-
Together, the adoption framework and RaMP give you both the strategic planning structure and the tactical quick wins needed to make progress on your Zero Trust journey.
31+
The *Rapidly modernize your security posture* scenario is typically the starting point because it builds the organizational capacity—strategy alignment, risk assessment, security hygiene, and a repeatable adoption process—needed to systematically execute the other business scenarios. In turn, the other scenarios supply the technical objectives that feed through this process and accelerate the overall transformation.

0 commit comments

Comments
 (0)