You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/7b-define-security-strategy.yml
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/7b-define-security-strategy.md
+32-17Lines changed: 32 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
The previous unit showed how to evaluate an existing security posture and design a strategy from the findings. But what if your organization lacks a formal security strategy altogether? Organizations adopting cloud for the first time, startups scaling beyond their initial infrastructure, and enterprises that historically relied on implicit security practices all face the same challenge—they need to design a security and governance strategy before they can evaluate against one.
1
+
The previous unit showed how to evaluate an existing security posture and design a strategy from the findings. But what if your organization lacks a formal security strategy altogether? Organizations without one—whether adopting cloud for the first time or scaling beyond implicit security practices—need to design a strategy before they can evaluate against one.
2
2
3
-
This unit covers how to design a new strategy for security and governance based on the Cloud Adoption Framework (CAF) and the Well-Architected Framework (WAF). CAF provides the organizational and lifecycle structure—how to plan, adopt, govern, and manage security across your cloud estate. WAF provides the architectural quality standards—what security properties your workloads must exhibit. A comprehensive strategy draws on both: CAF shapes the strategic direction and governance model, while WAF defines the security requirements that workloads must satisfy.
3
+
This unit covers how to design a new strategy for security and governance based on the Cloud Adoption Framework (CAF) and the Well-Architected Framework (WAF). CAF provides the organizational and lifecycle structure—how to plan, adopt, govern, and manage security across your cloud estate. WAF provides the architectural quality standards—what security properties your workloads must exhibit.
4
4
5
5
## Recognize when you need a new strategy
6
6
@@ -11,7 +11,7 @@ Defining a new security strategy is appropriate when one or more of these condit
11
11
-**Major transformation**: The organization is undergoing a significant shift—such as a first cloud adoption, a merger, or a move to a new operating model—that invalidates prior assumptions.
12
12
-**Regulatory change**: New compliance requirements demand a fundamentally different security approach rather than incremental adjustments.
13
13
14
-
If a documented cloud security strategy already exists, use the evaluation approach from the previous unit instead. Defining a new strategy and evaluating an existing one are complementary activities—most organizations cycle between both as their environment evolves.
14
+
If a documented cloud security strategy already exists, use the evaluation approach from the previous unit instead.
15
15
16
16
## Address organizational readiness
17
17
@@ -23,6 +23,16 @@ Cloud security requires a broader set of participants than traditional on-premis
23
23
24
24
**Secure executive sponsorship.** A security strategy without executive backing becomes a document that nobody follows. Ensure leadership understands the business rationale—risk reduction, compliance enablement, and business agility—and commits resources for implementation.
25
25
26
+
## Establish security objectives
27
+
28
+
Before defining how to address each strategy component, establish what security must achieve. Work with business stakeholders to define objectives that are:
29
+
30
+
-**Business-aligned**: Tie each objective to a business outcome—revenue protection, customer trust, or regulatory compliance.
31
+
-**Risk-informed**: Prioritize based on threat likelihood and business impact. Focus resources where potential harm is greatest.
32
+
-**Measurable**: Define metrics that demonstrate progress—reduction in exposure, detection coverage, or mean time to remediate.
33
+
34
+
These objectives become the criteria for evaluating each strategy component that follows.
35
+
26
36
## Define strategy components
27
37
28
38
The CAF Secure methodology organizes security strategy into six components. Each addresses a distinct aspect of your security posture and together they form a comprehensive strategy. As you define each component, the WAF security pillar provides the architectural requirements that translate strategic intent into workload-level design decisions.
@@ -31,8 +41,10 @@ The CAF Secure methodology organizes security strategy into six components. Each
31
41
32
42
Security posture modernization means continuously improving your defensive capabilities to keep pace with evolving threats. This component addresses:
33
43
44
+
-**Identity and access governance**: In cloud environments, identity is the primary control plane. Define policies for authentication strength, privileged access lifecycle, conditional access based on risk signals, and service identity management. MCSB dedicates two domains—Identity Management and Privileged Access—to these controls, and WAF checklist item SE:05 specifies workload-level identity and access requirements.
45
+
-**Network segmentation**: Define a network architecture that enforces isolation between trust zones, segmented by workload sensitivity and function. WAF checklist item SE:06 specifies workload-level network controls including traffic filtering and ingress/egress restrictions.
34
46
-**Asset visibility**: You can't protect what you can't see. Establish a comprehensive inventory of identities, devices, applications, data, and infrastructure across cloud and on-premises environments.
35
-
-**Configuration baselines**: Define secure configuration standards for each asset category. Use the Microsoft Cloud Security Benchmark as a control framework to establish baseline requirements across 12 security domains—from network security and identity management to data protection and AI workload security. At the workload level, WAF checklist item SE:01 reinforces this by requiring a security baseline aligned to compliance requirements, industry standards, and platform recommendations.
47
+
-**Configuration baselines**: Define secure configuration standards for each asset category. Use the Microsoft Cloud Security Benchmark to establish baseline requirements across its 12 security domains. WAF checklist item SE:01 reinforces this by requiring a security baseline aligned to compliance requirements, industry standards, and platform recommendations.
36
48
-**Continuous assessment**: Implement automated tools that measure posture against your baselines. *Microsoft example: Microsoft Defender for Cloud provides cloud security posture management (CSPM) with secure score and regulatory compliance dashboards.*
37
49
38
50
#### Adopt Zero Trust as a strategic foundation
@@ -43,7 +55,7 @@ The CAF Secure methodology positions Zero Trust adoption as a core element of po
43
55
-**Use least privilege**: Limit access with just-in-time and just-enough-access policies, risk-based adaptive controls, and data protection requirements tied to sensitivity levels.
44
56
-**Assume breach**: Minimize blast radius through segmentation. Verify end-to-end encryption. Use analytics to detect threats and improve defenses proactively.
45
57
46
-
These principles apply across all six pillars of a Zero Trust architecture: identities, devices, applications, data, infrastructure, and networks. When defining your strategy, map each principle to specific controls within each pillar rather than treating Zero Trust as an abstract goal. The WAF security design principle "plan your security readiness" explicitly requires accounting for Zero Trust and the CIA Triad when creating a workload-level security readiness plan.
58
+
These principles apply across six Zero Trust pillars: identities, devices, applications, data, infrastructure, and networks. Map each principle to specific controls within each pillar rather than treating Zero Trust as an abstract goal. The WAF design principle "plan your security readiness" requires accounting for Zero Trust and the CIA Triad in workload-level planning.
47
59
48
60
### Incident preparedness
49
61
@@ -52,14 +64,15 @@ No security strategy eliminates all risk. Your strategy must account for how the
52
64
-**Detection capabilities**: Define monitoring coverage requirements for each environment—cloud workloads, identity systems, network traffic, and endpoint activity. Specify detection time targets for critical threat categories.
53
65
-**Response procedures**: Establish incident response plans that define roles, communication channels, escalation paths, and decision authority. Include procedures for both contained incidents (single-workload compromise) and broad-impact scenarios (identity provider compromise, supply chain attack). WAF checklist item SE:12 requires workload-specific incident response procedures covering localized issues through disaster recovery.
54
66
-**Recovery objectives**: Set recovery time objectives (RTO) and recovery point objectives (RPO) for security-related outages. Define what "recovered" means for each critical system—restored operations, confirmed absence of persistence mechanisms, and validated integrity of data.
55
-
-**Practice and refinement**: Conduct tabletop exercises and simulated attacks regularly. Update response procedures based on lessons learned and emerging threat intelligence.
67
+
-**Practice and refinement**: Conduct tabletop exercises and simulated attacks regularly. Update procedures based on lessons learned.
56
68
57
69
### Confidentiality strategy
58
70
59
71
Confidentiality ensures that sensitive information is accessible only to authorized entities. WAF checklist items SE:03 (classify and label data by sensitivity) and SE:07 (encrypt data using modern standards aligned to classification) provide the workload-level implementation requirements for this component. Your strategy should define:
60
72
61
73
-**Data classification**: Establish classification levels (public, internal, confidential, highly confidential) and the criteria for assigning each level. Classification drives all downstream protection decisions.
62
-
-**Data protection controls**: Map specific protection mechanisms to each classification level—encryption at rest and in transit, access controls, data loss prevention policies, and information barriers.
74
+
-**Data protection controls**: Map specific protection mechanisms to each classification level—encryption at rest and in transit, access controls, and information barriers.
75
+
-**Data loss prevention (DLP)**: Define a DLP strategy that prevents sensitive data from being shared, transferred, or exposed outside authorized boundaries. DLP policies should align to your classification levels and cover email, cloud storage, endpoints, and collaboration platforms.
63
76
-**Regulatory alignment**: Identify which data falls under regulatory requirements (HIPAA, PCI-DSS, industry-specific mandates) and ensure your classification and protection scheme satisfies those obligations.
64
77
-**Lifecycle management**: Define how data is handled from creation through disposal, including retention policies and secure deletion procedures.
65
78
@@ -89,17 +102,19 @@ A security strategy fails if it only addresses today's environment. Sustainment
89
102
-**Threat landscape monitoring**: Assign responsibility for tracking emerging threats and technologies that could affect your security posture, including new attack techniques and evolving regulatory requirements.
90
103
-**Skill development**: Plan for ongoing training and skills investment as cloud services and threat tactics evolve. Security knowledge has a short half-life; build learning into your operating model.
91
104
92
-
## Structure the strategy document
105
+
## Address governance and compliance
106
+
107
+
A strategy without governance remains aspirational. Governance provides the enforcement mechanisms that translate strategic objectives into verifiable, consistent practice across your cloud estate:
108
+
109
+
-**Policy-as-code**: Codify security requirements as automated policies that prevent noncompliant deployments, audit existing configurations, and remediate drift. *Microsoft example: Azure Policy evaluates resources against defined rules and can deny, audit, or auto-remediate noncompliant configurations.*
110
+
-**Compliance mapping**: Map each strategy component to the regulatory and industry frameworks your organization must satisfy—HIPAA, PCI-DSS, sector-specific mandates, or internal standards. Track adherence through continuous compliance monitoring rather than periodic audits alone.
111
+
-**Exception management**: Define a formal process for security exceptions—risk acceptance criteria, approval authority, time-bound expiration, and compensating controls. Without a clear exception process, teams bypass controls informally.
112
+
-**Secure development lifecycle**: Commit to integrating security into every phase of software delivery—threat modeling during design, secure code review during development, automated security testing in deployment pipelines, and runtime protection in production. WAF checklist item SE:02 requires a hardened software supply chain with integrated threat modeling.
93
113
94
-
Bring these components together into a documented strategy that maps CAF lifecycle phases to WAF quality requirements. The document should be something stakeholders can reference and act on:
114
+
## Address AI workload security
95
115
96
-
1.**Business context**: State the business drivers, risk appetite, and compliance obligations that shape security priorities.
97
-
2.**Principles**: Define the security principles (Zero Trust, defense in depth, least privilege) that guide all decisions.
98
-
3.**Strategy components**: Document posture modernization, incident preparedness, confidentiality, integrity, availability, and sustainment objectives with measurable targets. Reference the specific MCSB controls and WAF checklist items (SE:01–SE:12) that each objective addresses.
99
-
4.**Scope mapping**: Assign each objective to the appropriate scope—strategy (CAF Secure methodology), platform (landing zones and MCSB), or workload (WAF security checklist)—so that the right teams own the right objectives. CAF-scope objectives address organizational direction and governance. Platform-scope objectives address infrastructure controls. Workload-scope objectives address the architectural requirements defined by WAF.
100
-
5.**Phased roadmap**: Sequence implementation based on risk, business impact, and dependencies. Use the prioritization criteria discussed in the previous unit's gap analysis.
101
-
6.**Success metrics**: Define how you measure progress—secure score targets, compliance percentages, mean time to detect, mean time to respond, and coverage metrics for each strategy component.
116
+
Organizations deploying AI workloads face additional security concerns that traditional strategies don't cover. Your strategy should address model protection (securing model weights and training data as high-value assets), input validation (filtering for prompt injection and adversarial inputs), output controls (preventing data leakage through model responses), and monitoring for unusual query patterns. MCSB includes a dedicated AI security domain that provides controls for these scenarios.
102
117
103
-
The strategy document doesn't need to be lengthy. Clarity and actionability matter more than comprehensiveness. A concise strategy that teams actually follow is more effective than a detailed document that sits unread.
118
+
With all strategy components and governance mechanisms defined, document the strategy with measurable targets for each component, scope assignments—CAF for organizational objectives, landing zones for platform controls, WAF for workload requirements—and a phased roadmap prioritized by risk and business impact.
104
119
105
-
With a security and governance strategy defined—whether from evaluation findings (previous unit) or from the ground up (this unit)—the next step is recommending specific solutions that implement each capability your strategy requires.
120
+
The next step is recommending specific solutions that implement each capability your strategy requires.
0 commit comments