Skip to content

Commit ff0874d

Browse files
committed
updates
1 parent 1d735fb commit ff0874d

4 files changed

Lines changed: 90 additions & 107 deletions

File tree

Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-align-cloud-adoption-framework-well-architected-framework.design-security-with-azure-landing-zones
3-
title: Design security with Azure Landing Zones
3+
title: Design security with Azure landing zones
44
metadata:
5-
title: Design security with Azure Landing Zones
6-
description: "SC-100 preparatory unit on the topic: Design security with Azure Landing Zones."
5+
title: Design security with Azure landing zones
6+
description: "Learn how to design solutions for implementing and governing security using Azure landing zones."
77
ms.date: 01/24/2026
88
author: ceperezb
99
ms.author: ceperezb
1010
ms.topic: unit
11-
durationInMinutes: 10
11+
ai-usage: ai-assisted
12+
durationInMinutes: 7
1213
content: |
1314
[!include[](includes/5-design-security-with-azure-landing-zones.md)]

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/8a-design-devsecops-processes.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
11
### YamlMime:ModuleUnit
22
uid: learn.wwl.design-solutions-align-cloud-adoption-framework-well-architected-framework.design-devsecops-processes
3-
title: Design DevSecOps processes
3+
title: Design DevSecOps processes that align with best practices of the Cloud Adoption Framework
44
metadata:
5-
title: Design DevSecOps processes
6-
description: "SC-100 preparatory unit on designing DevSecOps processes that integrate security throughout the software development lifecycle."
5+
title: Design DevSecOps processes that align with best practices of the Cloud Adoption Framework
6+
description: "Design DevSecOps processes that align with best practices of the Cloud Adoption Framework."
77
ms.date: 01/24/2026
88
author: ceperezb
99
ms.author: ceperezb

learn-pr/wwl-sci/design-solutions-align-cloud-adoption-framework-well-architected-framework/includes/3-cloud-adoption-framework-secure-methodology.md

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -94,26 +94,6 @@ Security is a human discipline that requires clear roles and responsibilities. T
9494

9595
As a Security Architect, you work across these teams to ensure security is integrated into designs, decisions are informed by risk, and controls are operationally sustainable.
9696

97-
## Security transformation drivers
98-
99-
Security organizations face two major transformations:
100-
101-
**Security as business risk**: Security has evolved from a purely technical discipline into business risk management. This shift is driven by:
102-
- Digital transformation increasing the potential attack surface
103-
- Threat landscape growth fueled by industrialized attack economies with specialized skills and commoditized attack tools
104-
105-
**Platform change**: Security teams are grappling with a technical platform shift to the cloud—comparable to factories moving from private generators to an electrical grid. While teams often have the right foundational skills, they can be overwhelmed by changes to nearly every process and technology.
106-
107-
**Shift in expectations**: Business agility, especially for digital transformation, can quickly unseat market leaders. While security once started with "no" to block projects, the urgency of digital transformation requires a new engagement model: "let's talk about how to stay safe while you do what is needed to stay relevant."
108-
109-
## Guiding lasting transformation
110-
111-
Transforming how business and technology teams view security requires alignment with priorities, processes, and risk frameworks:
112-
113-
- **Culture**: Security must focus on safely meeting the business mission, not impeding it. Security must also become normalized as the internet allows adversaries to attempt attacks at any time. This cultural shift requires improved processes, partnerships, and ongoing leadership support.
114-
- **Risk ownership**: Accountability for security risk should be assigned to the same roles that own all other risks, freeing security to be a trusted advisor rather than a scapegoat. Security should be responsible for sound, balanced advice communicated in business language, but not held accountable for decisions it doesn't own.
115-
- **Security talent**: Security talent is in chronic shortage. Organizations should develop and distribute security knowledge and skills by growing security skill sets within existing IT and business teams, and by recruiting diverse skill sets to security teams for fresh perspectives.
116-
11797
## Bringing it all together
11898

11999
The CAF Secure methodology provides Security Architects with a comprehensive framework for integrating security into cloud adoption. By applying CIA Triad principles and Zero Trust across all CAF phases, you ensure that security isn't an afterthought but a foundational element of your cloud architecture.

0 commit comments

Comments
 (0)