Skip to content

Commit d158520

Browse files
authored
Merge pull request #53764 from ceperezb/CEPEREZB-sc100-secure-organizational-data
unit update
2 parents 9b2b311 + a2bc8cf commit d158520

1 file changed

Lines changed: 8 additions & 8 deletions

File tree

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,27 +1,27 @@
1-
Data security design requires a structured approach grounded in established frameworks and security principles. This unit covers the foundational concepts and frameworks that guide your data security architecture decisions.
1+
As a cybersecurity architect, your data security design requires a structured approach grounded in established frameworks and security principles. This unit covers the foundational concepts and frameworks that guide your data security architecture decisions.
22

33
## Data security design principles
44

5-
Effective data security design follows Zero Trust principles: verify explicitly, use least privilege access, and assume breach. These principles translate into specific architectural considerations:
5+
Effective data security design follows [Zero Trust principles](/security/zero-trust/zero-trust-overview): verify explicitly, use least privilege access, and assume breach. These principles translate into specific architectural considerations:
66

7-
- **Know your data**: You can't protect what you don't know exists. Discovery and classification form the foundation of any data security strategy.
7+
- **Know your data**: You can't protect what you don't know exists. Discovery and classification form the foundation of any data security strategy. Without understanding what data you have and its sensitivity level, you can't **verify explicitly** that the right access decisions are being made.
88

9-
- **Protect data across its lifecycle**: Data requires protection at rest, in transit, and in use. Each state presents unique risks and requires specific controls.
9+
- **Protect data across its lifecycle**: Data requires protection at rest, in transit, and in use. Each state presents unique risks and requires specific controls. Encrypting and safeguarding data in every state reflects the **assume breach** principle—if an attacker gains access to one layer, the data itself remains protected.
1010

11-
- **Implement defense in depth**: Layer multiple security controls so that if one fails, others continue to provide protection.
11+
- **Implement defense in depth**: Layer multiple security controls so that if one fails, others continue to provide protection. This approach directly supports **assume breach** by ensuring that no single point of compromise exposes your data, and reinforces **least privilege access** by applying granular controls at each layer.
1212

13-
- **Automate protection where possible**: Manual processes don't scale. Use automation to consistently apply policies across your data estate.
13+
- **Automate protection where possible**: Manual processes don't scale. Use automation to consistently apply policies across your data estate. Automated classification, labeling, and access enforcement help you **verify explicitly** at scale and ensure **least privilege access** is maintained as your environment evolves.
1414

1515
## Framework alignment for data security
1616

1717
When designing data security solutions, align your architecture with established frameworks:
1818

19-
- **Cloud Adoption Framework (CAF)**: Provides guidance for data classification, governance, and protection as part of cloud adoption planning.
19+
- **Cloud Adoption Framework (CAF)**: Provides guidance for establishing data governance policies, classification, and protection during the Govern and Manage phases of cloud adoption.
2020

2121
- **Well-Architected Framework (WAF)**: The Security pillar emphasizes data protection through encryption, classification, and access controls.
2222

2323
- **Microsoft Cybersecurity Reference Architecture (MCRA)**: Offers technical reference architectures showing how Microsoft security capabilities integrate for comprehensive data protection.
2424

2525
- **Microsoft Cloud Security Benchmark (MCSB)**: Defines eight [data protection controls](/security/benchmark/azure/mcsb-v2-data-protection) covering discovery, classification, encryption, and key management that guide your design decisions throughout this module.
2626

27-
These frameworks work together to help you design solutions that are secure, compliant, and operationally efficient.
27+
These frameworks work together to help you design solutions that are secure, compliant, and operationally efficient. The next unit applies these principles by designing solutions for data discovery and classification.

0 commit comments

Comments
 (0)