Skip to content

Commit bd476fb

Browse files
committed
fix intro and summary
1 parent b056e48 commit bd476fb

5 files changed

Lines changed: 8 additions & 19 deletions

File tree

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/3b-design-solutions-rapid-modernization-plan.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-microsoft-cybersecurity-cloud-security-benchmark.design-solutions-rapid-modernization-plan
3-
title: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework
3+
title: Design solutions that align with the Zero Trust adoption framework
44
metadata:
5-
title: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework
6-
description: "SC-100 preparatory content on topic: Design solutions that align with best practices for Zero Trust security, including the Zero Trust adoption framework."
5+
title: Design solutions that align with the Zero Trust adoption framework
6+
description: "SC-100 preparatory content on topic: Design solutions that align with the Zero Trust adoption framework."
77
ms.date: 02/24/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/0-introduction.md

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,6 @@ In this module, you learn how to:
1010

1111
- Use the Microsoft Cybersecurity Reference Architecture (MCRA) to design more secure solutions.
1212
- Use Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.
13-
- Design solutions with best practices for security capabilities and controls.
14-
- Design solutions for protecting against insider threats, external attacks, and supply chain attacks.
15-
- Design AI solutions that align to the Microsoft Cloud Security Benchmark.
16-
- Design solutions to align to a Zero Trust rapid modernization plan.
17-
18-
The content in the module helps you prepare for the certification exam SC-100: Microsoft Cybersecurity Architect.
1913

2014
## Prerequisites
2115

learn-pr/wwl-sci/design-solutions-microsoft-cybersecurity-cloud-security-benchmark/includes/5-summary.md

Lines changed: 1 addition & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ You also learned how to design solutions that protect against three distinct thr
44

55
You explored AI security and its three core pillars: AI platform security, AI application security, and monitoring and response. The MCSB v2 AI controls (AI-1 through AI-7) provide a framework for addressing AI-specific risks like model theft, prompt injection, and adversarial attacks.
66

7-
Finally, you learned about the Zero Trust Rapid Modernization Plan (RaMP), which provides a prioritized approach to implementing Zero Trust. RaMP focuses on high-impact initiatives—identity protection, privileged access security, and data protection—that reduce risk quickly while building toward comprehensive Zero Trust adoption.
7+
Finally, you learned about the Zero Trust cloud adoption framework, which provides a methodical approach to implementing Zero Trust across your digital estate and can help accelerate adoption.
88

99
The main takeaways from this module are:
1010

@@ -18,10 +18,6 @@ In this module, you learned how to:
1818

1919
- Use the Microsoft Cybersecurity Reference Architecture (MCRA) to design more secure solutions.
2020
- Use Microsoft Cloud Security Benchmark (MCSB) to design more secure solutions.
21-
- Design solutions with best practices for security capabilities and controls.
22-
- Design solutions for protecting against insider threats, external attacks, and supply chain attacks.
23-
- Design AI solutions that align to the Microsoft Cloud Security Benchmark.
24-
- Design solutions that align to a Zero Trust rapid modernization plan.
2521

2622
## Learn more with security documentation
2723

@@ -30,7 +26,6 @@ In this module, you learned how to:
3026
- [Overview of the Microsoft Cloud Security Benchmark](/security/benchmark/azure/overview)
3127
- [MCSB v2 AI Security Controls](/security/benchmark/azure/mcsb-v2-artificial-intelligence-security)
3228
- [Security for AI](/security/ai/)
33-
- [Zero Trust Rapid Modernization Plan](/security/zero-trust/zero-trust-ramp-overview)
3429
- [What is Zero Trust?](/security/zero-trust/zero-trust-overview)
3530
- [Zero Trust adoption framework overview](/security/zero-trust/adopt/zero-trust-adoption-overview)
3631
- [Rapidly modernize your security posture](/security/zero-trust/adopt/rapidly-modernize-security-posture)

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/0-introduction.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
As a cybersecurity architect, you're responsible for designing security strategies that protect your organization's digital estate. To do this effectively, you need to understand the best practice frameworks available to you and how they work together.
22

3-
This module introduces you to the concept of Zero Trust, common security antipatterns, and the key best practice frameworks that Microsoft provides for cybersecurity. You explore the Cloud Adoption Framework (CAF), the Azure Well-Architected Framework (WAF), the Microsoft Cybersecurity Reference Architectures (MCRA), and the Microsoft cloud security benchmark (MCSB). You also learn about the Zero Trust adoption framework and the rapid modernization approach.
3+
This module introduces you to the concept of Zero Trust, common security antipatterns, and the key best practice frameworks that Microsoft provides for cybersecurity. You explore the Cloud Adoption Framework (CAF), the Azure Well-Architected Framework (WAF), the Microsoft Cybersecurity Reference Architectures (MCRA), and the Microsoft cloud security benchmark (MCSB). You also learn about the Zero Trust adoption framework.
44

55
This module is the first in a series that makes up the Cybersecurity Architects training content. Later modules cover these frameworks in greater depth from a design and evaluation perspective. Here, the focus is on understanding what each framework is, what it provides, and when to use it.
66

@@ -11,7 +11,7 @@ By the end of this module, you're able to:
1111
- Describe common security antipatterns and the role of best practices for cybersecurity architects.
1212
- Describe the concept of Zero Trust and its guiding principles.
1313
- Describe the purpose and scope of CAF, WAF, MCRA, and MCSB.
14-
- Describe the Zero Trust adoption framework and the approach to rapid modernization.
14+
- Describe the Zero Trust adoption framework.
1515
- Describe how the different best practice frameworks relate to each other.
1616

1717
## Prerequisites

learn-pr/wwl-sci/introduction-zero-trust-best-practice-frameworks/includes/7-summary.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ In this module, you learned about the concept of Zero Trust and the best practic
22

33
You explored how best practices help you avoid common security antipatterns, and how cybersecurity architects integrate these practices into architecture, policy, and organizational processes. You learned that Zero Trust is a security strategy built on three guiding principles: verify explicitly, use least privilege access, and assume breach. These principles are applied across six technology pillars—identities, endpoints, data, applications, infrastructure, and network—tied together by visibility, automation, and orchestration.
44

5-
You also examined four key frameworks: the Cloud Adoption Framework (CAF) for guiding cloud adoption, the Azure Well-Architected Framework (WAF) for improving workload quality, the Microsoft Cybersecurity Reference Architectures (MCRA) for end-to-end security architecture, and the Microsoft cloud security benchmark (MCSB) for prescriptive security controls. You learned how the Zero Trust adoption framework provides a phased, business-driven approach to implementing Zero Trust, and how the Rapid Modernization Plan (RaMP) helps you prioritize quick wins.
5+
You also examined four key frameworks: the Cloud Adoption Framework (CAF) for guiding cloud adoption, the Azure Well-Architected Framework (WAF) for improving workload quality, the Microsoft Cybersecurity Reference Architectures (MCRA) for end-to-end security architecture, and the Microsoft cloud security benchmark (MCSB) for prescriptive security controls. You learned how the Zero Trust adoption framework provides a phased, business-driven approach to implementing Zero Trust.
66

77
Finally, you explored how these frameworks relate to each other. They operate at different levels—from strategy and architecture to workload design and specific controls—and are designed to work together as a comprehensive system.
88

@@ -13,7 +13,7 @@ In this module, you learned how to:
1313
- Describe common security antipatterns and the role of best practices for cybersecurity architects.
1414
- Describe the concept of Zero Trust and its guiding principles.
1515
- Describe the purpose and scope of CAF, WAF, MCRA, and MCSB.
16-
- Describe the Zero Trust adoption framework and the approach to rapid modernization.
16+
- Describe the Zero Trust adoption framework.
1717
- Describe how the different best practice frameworks relate to each other.
1818

1919
## Learn more

0 commit comments

Comments
 (0)