Skip to content

Commit caac108

Browse files
committed
fix for blocking pr issues
1 parent 71fb212 commit caac108

3 files changed

Lines changed: 6 additions & 7 deletions

File tree

learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/2-support-business-resiliency.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,11 +28,11 @@ Effective business resiliency requires identifying which assets are most critica
2828

2929
Work with business stakeholders to determine which systems, data, and processes are essential for maintaining operations. Microsoft documentation identifies five priority categories:
3030

31-
1. **Identity systems**: Required for users to access all other systems, including Active Directory, Microsoft Entra Connect, and domain controllers.
32-
2. **Human life systems**: Any system that supports human life or could put it at risk, such as medical systems, safety systems, large machinery controls, and chemical or biological systems.
33-
3. **Financial systems**: Systems that process monetary transactions and keep the business operating, such as payment systems and financial reporting databases.
34-
4. **Product or service enablement**: Systems required to provide business services or produce products, including factory control systems, delivery infrastructure, and dispatch systems.
35-
5. **Security systems (minimum)**: Security systems needed to monitor for attacks and provide minimum security services. This should focus on ensuring current attacks can't immediately regain access to restored systems.
31+
- **Identity systems**: Required for users to access all other systems, including Active Directory, Microsoft Entra Connect, and domain controllers.
32+
- **Human life systems**: Any system that supports human life or could put it at risk, such as medical systems, safety systems, large machinery controls, and chemical or biological systems.
33+
- **Financial systems**: Systems that process monetary transactions and keep the business operating, such as payment systems and financial reporting databases.
34+
- **Product or service enablement**: Systems required to provide business services or produce products, including factory control systems, delivery infrastructure, and dispatch systems.
35+
- **Security systems (minimum)**: Security systems needed to monitor for attacks and provide minimum security services. This should focus on ensuring current attacks can't immediately regain access to restored systems.
3636

3737
In modern organizations, this identification must also account for AI and machine learning systems that support business decisions, AI-powered customer service platforms, predictive analytics that drive revenue, and automated business process systems.
3838

learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/3-ransomware-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ This phase is designed to minimize the monetary incentive from ransomware attack
1919

2020
The most immediate and effective action is to ensure your organization can restore your entire enterprise from immutable storage that neither the cybercriminal nor you can modify. Identify the most sensitive assets and protect them at a higher level of assurance.
2121

22-
Your prioritized backup list also becomes your prioritized restore list. Identify business-critical systems in this priority order:
22+
Your prioritized backup list also becomes your prioritized restore list. Identify business-critical systems in this priority order, based on technical restoration dependencies (for example, identity systems must be restored first because all other systems depend on them for authentication and access):
2323

2424
1. **Identity systems**: Active Directory, Microsoft Entra Connect, domain controllers
2525
2. **Human life systems**: Medical, safety, and life support systems

learn-pr/wwl-sci/design-resiliency-strategy-common-cyberthreats-like-ransomware/includes/5-security-updates.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,3 @@
1-
## Evaluate solutions for security updates
21

32
Security updates protect workloads against security vulnerabilities that are continuously discovered by threat researchers and attackers. Security update solutions help you evaluate, track, and deploy patches across your environment to reduce exposure to known vulnerabilities.
43

0 commit comments

Comments
 (0)