You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/2-support-business-resiliency.md
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,11 +28,11 @@ Effective business resiliency requires identifying which assets are most critica
28
28
29
29
Work with business stakeholders to determine which systems, data, and processes are essential for maintaining operations. Microsoft documentation identifies five priority categories:
30
30
31
-
1.**Identity systems**: Required for users to access all other systems, including Active Directory, Microsoft Entra Connect, and domain controllers.
32
-
2.**Human life systems**: Any system that supports human life or could put it at risk, such as medical systems, safety systems, large machinery controls, and chemical or biological systems.
33
-
3.**Financial systems**: Systems that process monetary transactions and keep the business operating, such as payment systems and financial reporting databases.
34
-
4.**Product or service enablement**: Systems required to provide business services or produce products, including factory control systems, delivery infrastructure, and dispatch systems.
35
-
5.**Security systems (minimum)**: Security systems needed to monitor for attacks and provide minimum security services. This should focus on ensuring current attacks can't immediately regain access to restored systems.
31
+
-**Identity systems**: Required for users to access all other systems, including Active Directory, Microsoft Entra Connect, and domain controllers.
32
+
-**Human life systems**: Any system that supports human life or could put it at risk, such as medical systems, safety systems, large machinery controls, and chemical or biological systems.
33
+
-**Financial systems**: Systems that process monetary transactions and keep the business operating, such as payment systems and financial reporting databases.
34
+
-**Product or service enablement**: Systems required to provide business services or produce products, including factory control systems, delivery infrastructure, and dispatch systems.
35
+
-**Security systems (minimum)**: Security systems needed to monitor for attacks and provide minimum security services. This should focus on ensuring current attacks can't immediately regain access to restored systems.
36
36
37
37
In modern organizations, this identification must also account for AI and machine learning systems that support business decisions, AI-powered customer service platforms, predictive analytics that drive revenue, and automated business process systems.
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/3-ransomware-protection.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,7 +19,7 @@ This phase is designed to minimize the monetary incentive from ransomware attack
19
19
20
20
The most immediate and effective action is to ensure your organization can restore your entire enterprise from immutable storage that neither the cybercriminal nor you can modify. Identify the most sensitive assets and protect them at a higher level of assurance.
21
21
22
-
Your prioritized backup list also becomes your prioritized restore list. Identify business-critical systems in this priority order:
22
+
Your prioritized backup list also becomes your prioritized restore list. Identify business-critical systems in this priority order, based on technical restoration dependencies (for example, identity systems must be restored first because all other systems depend on them for authentication and access):
23
23
24
24
1.**Identity systems**: Active Directory, Microsoft Entra Connect, domain controllers
25
25
2.**Human life systems**: Medical, safety, and life support systems
Copy file name to clipboardExpand all lines: learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/5-security-updates.md
-1Lines changed: 0 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,3 @@
1
-
## Evaluate solutions for security updates
2
1
3
2
Security updates protect workloads against security vulnerabilities that are continuously discovered by threat researchers and attackers. Security update solutions help you evaluate, track, and deploy patches across your environment to reduce exposure to known vulnerabilities.
0 commit comments