Arquitecto de Ciberseguridad
Arquitecto de Ciberseguridad
Official
Course
SC-100T00
Microsoft Cybersecurity
Architect
SC-100T00
Microsoft Cybersecurity
Architect
II Disclaimer
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names,
e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with
any real company, organization, product, domain name, e-mail address, logo, person, place or event is
intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the
user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in
or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical,
photocopying, recording, or otherwise), or for any purpose, without the express written permission of
Microsoft Corporation.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property
rights covering subject matter in this document. Except as expressly provided in any written license
agreement from Microsoft, the furnishing of this document does not give you any license to these
patents, trademarks, copyrights, or other intellectual property.
The names of manufacturers, products, or URLs are provided for informational purposes only and
Microsoft makes no representations and warranties, either expressed, implied, or statutory, regarding
these manufacturers or the use of the products with any Microsoft technologies. The inclusion of a
manufacturer or product does not imply endorsement of Microsoft of the manufacturer or product. Links
may be provided to third party sites. Such sites are not under the control of Microsoft and Microsoft is
not responsible for the contents of any linked site or any link contained in a linked site, or any changes or
updates to such sites. Microsoft is not responsible for webcasting or any other form of transmission
received from any linked site. Microsoft is providing these links to you only as a convenience, and the
inclusion of any link does not imply endorsement of Microsoft of the site or the products contained
therein.
1 http://www.microsoft.com/trademarks
EULA III
13. “Personal Device” means one (1) personal computer, device, workstation or other digital electronic
device that you personally own or control that meets or exceeds the hardware level specified for
the particular Microsoft Instructor-Led Courseware.
14. “Private Training Session” means the instructor-led training classes provided by MPN Members for
corporate customers to teach a predefined learning objective using Microsoft Instructor-Led
Courseware. These classes are not advertised or promoted to the general public and class attend-
ance is restricted to individuals employed by or contracted by the corporate customer.
15. “Trainer” means (i) an academically accredited educator engaged by a Microsoft Imagine Academy
Program Member to teach an Authorized Training Session, (ii) an academically accredited educator
validated as a Microsoft Learn for Educators – Validated Educator, and/or (iii) a MCT.
16. “Trainer Content” means the trainer version of the Microsoft Instructor-Led Courseware and
additional supplemental content designated solely for Trainers’ use to teach a training session
using the Microsoft Instructor-Led Courseware. Trainer Content may include Microsoft PowerPoint
presentations, trainer preparation guide, train the trainer materials, Microsoft One Note packs,
classroom setup guide and Pre-release course feedback form. To clarify, Trainer Content does not
include any software, virtual hard disks or virtual machines.
2. USE RIGHTS. The Licensed Content is licensed, not sold. The Licensed Content is licensed on a one
copy per user basis, such that you must acquire a license for each individual that accesses or uses the
Licensed Content.
●● 2.1 Below are five separate sets of use rights. Only one set of rights apply to you.
1. If you are a Microsoft Imagine Academy (MSIA) Program Member:
1. Each license acquired on behalf of yourself may only be used to review one (1) copy of the
Microsoft Instructor-Led Courseware in the form provided to you. If the Microsoft Instruc-
tor-Led Courseware is in digital format, you may install one (1) copy on up to three (3)
Personal Devices. You may not install the Microsoft Instructor-Led Courseware on a device
you do not own or control.
2. For each license you acquire on behalf of an End User or Trainer, you may either:
1. distribute one (1) hard copy version of the Microsoft Instructor-Led Courseware to one
(1) End User who is enrolled in the Authorized Training Session, and only immediately
prior to the commencement of the Authorized Training Session that is the subject matter
of the Microsoft Instructor-Led Courseware being provided, or
2. provide one (1) End User with the unique redemption code and instructions on how they
can access one (1) digital version of the Microsoft Instructor-Led Courseware, or
3. provide one (1) Trainer with the unique redemption code and instructions on how they
can access one (1) Trainer Content.
3. For each license you acquire, you must comply with the following:
1. you will only provide access to the Licensed Content to those individuals who have
acquired a valid license to the Licensed Content,
2. you will ensure each End User attending an Authorized Training Session has their own
valid licensed copy of the Microsoft Instructor-Led Courseware that is the subject of the
Authorized Training Session,
3. you will ensure that each End User provided with the hard-copy version of the Microsoft
Instructor-Led Courseware will be presented with a copy of this agreement and each End
EULA V
User will agree that their use of the Microsoft Instructor-Led Courseware will be subject
to the terms in this agreement prior to providing them with the Microsoft Instructor-Led
Courseware. Each individual will be required to denote their acceptance of this agree-
ment in a manner that is enforceable under local law prior to their accessing the Micro-
soft Instructor-Led Courseware,
4. you will ensure that each Trainer teaching an Authorized Training Session has their own
valid licensed copy of the Trainer Content that is the subject of the Authorized Training
Session,
5. you will only use qualified Trainers who have in-depth knowledge of and experience with
the Microsoft technology that is the subject of the Microsoft Instructor-Led Courseware
being taught for all your Authorized Training Sessions,
6. you will only deliver a maximum of 15 hours of training per week for each Authorized
Training Session that uses a MOC title, and
7. you acknowledge that Trainers that are not MCTs will not have access to all of the trainer
resources for the Microsoft Instructor-Led Courseware.
2. If you are a Microsoft Learning Competency Member:
1. Each license acquire may only be used to review one (1) copy of the Microsoft Instruc-
tor-Led Courseware in the form provided to you. If the Microsoft Instructor-Led Course-
ware is in digital format, you may install one (1) copy on up to three (3) Personal Devices.
You may not install the Microsoft Instructor-Led Courseware on a device you do not own or
control.
2. For each license you acquire on behalf of an End User or MCT, you may either:
1. distribute one (1) hard copy version of the Microsoft Instructor-Led Courseware to one
(1) End User attending the Authorized Training Session and only immediately prior to
the commencement of the Authorized Training Session that is the subject matter of the
Microsoft Instructor-Led Courseware provided, or
2. provide one (1) End User attending the Authorized Training Session with the unique
redemption code and instructions on how they can access one (1) digital version of the
Microsoft Instructor-Led Courseware, or
3. you will provide one (1) MCT with the unique redemption code and instructions on how
they can access one (1) Trainer Content.
3. For each license you acquire, you must comply with the following:
1. you will only provide access to the Licensed Content to those individuals who have
acquired a valid license to the Licensed Content,
2. you will ensure that each End User attending an Authorized Training Session has their
own valid licensed copy of the Microsoft Instructor-Led Courseware that is the subject of
the Authorized Training Session,
3. you will ensure that each End User provided with a hard-copy version of the Microsoft
Instructor-Led Courseware will be presented with a copy of this agreement and each End
User will agree that their use of the Microsoft Instructor-Led Courseware will be subject
to the terms in this agreement prior to providing them with the Microsoft Instructor-Led
Courseware. Each individual will be required to denote their acceptance of this agree-
ment in a manner that is enforceable under local law prior to their accessing the Micro-
soft Instructor-Led Courseware,
VI EULA
4. you will ensure that each MCT teaching an Authorized Training Session has their own
valid licensed copy of the Trainer Content that is the subject of the Authorized Training
Session,
5. you will only use qualified MCTs who also hold the applicable Microsoft Certification
credential that is the subject of the MOC title being taught for all your Authorized
Training Sessions using MOC,
6. you will only provide access to the Microsoft Instructor-Led Courseware to End Users,
and
7. you will only provide access to the Trainer Content to MCTs.
3. If you are a MPN Member:
1. Each license acquired on behalf of yourself may only be used to review one (1) copy of the
Microsoft Instructor-Led Courseware in the form provided to you. If the Microsoft Instruc-
tor-Led Courseware is in digital format, you may install one (1) copy on up to three (3)
Personal Devices. You may not install the Microsoft Instructor-Led Courseware on a device
you do not own or control.
2. For each license you acquire on behalf of an End User or Trainer, you may either:
1. distribute one (1) hard copy version of the Microsoft Instructor-Led Courseware to one
(1) End User attending the Private Training Session, and only immediately prior to the
commencement of the Private Training Session that is the subject matter of the Micro-
soft Instructor-Led Courseware being provided, or
2. provide one (1) End User who is attending the Private Training Session with the unique
redemption code and instructions on how they can access one (1) digital version of the
Microsoft Instructor-Led Courseware, or
3. you will provide one (1) Trainer who is teaching the Private Training Session with the
unique redemption code and instructions on how they can access one (1) Trainer
Content.
3. For each license you acquire, you must comply with the following:
1. you will only provide access to the Licensed Content to those individuals who have
acquired a valid license to the Licensed Content,
2. you will ensure that each End User attending an Private Training Session has their own
valid licensed copy of the Microsoft Instructor-Led Courseware that is the subject of the
Private Training Session,
3. you will ensure that each End User provided with a hard copy version of the Microsoft
Instructor-Led Courseware will be presented with a copy of this agreement and each End
User will agree that their use of the Microsoft Instructor-Led Courseware will be subject
to the terms in this agreement prior to providing them with the Microsoft Instructor-Led
Courseware. Each individual will be required to denote their acceptance of this agree-
ment in a manner that is enforceable under local law prior to their accessing the Micro-
soft Instructor-Led Courseware,
4. you will ensure that each Trainer teaching an Private Training Session has their own valid
licensed copy of the Trainer Content that is the subject of the Private Training Session,
EULA VII
5. you will only use qualified Trainers who hold the applicable Microsoft Certification
credential that is the subject of the Microsoft Instructor-Led Courseware being taught
for all your Private Training Sessions,
6. you will only use qualified MCTs who hold the applicable Microsoft Certification creden-
tial that is the subject of the MOC title being taught for all your Private Training Sessions
using MOC,
7. you will only provide access to the Microsoft Instructor-Led Courseware to End Users,
and
8. you will only provide access to the Trainer Content to Trainers.
4. If you are an End User:
For each license you acquire, you may use the Microsoft Instructor-Led Courseware solely for
your personal training use. If the Microsoft Instructor-Led Courseware is in digital format, you
may access the Microsoft Instructor-Led Courseware online using the unique redemption code
provided to you by the training provider and install and use one (1) copy of the Microsoft
Instructor-Led Courseware on up to three (3) Personal Devices. You may also print one (1) copy
of the Microsoft Instructor-Led Courseware. You may not install the Microsoft Instructor-Led
Courseware on a device you do not own or control.
5. If you are a Trainer.
1. For each license you acquire, you may install and use one (1) copy of the Trainer Content in
the form provided to you on one (1) Personal Device solely to prepare and deliver an
Authorized Training Session or Private Training Session, and install one (1) additional copy
on another Personal Device as a backup copy, which may be used only to reinstall the
Trainer Content. You may not install or use a copy of the Trainer Content on a device you do
not own or control. You may also print one (1) copy of the Trainer Content solely to prepare
for and deliver an Authorized Training Session or Private Training Session.
2. If you are an MCT, you may customize the written portions of the Trainer Content that are
logically associated with instruction of a training session in accordance with the most recent
version of the MCT agreement.
3. If you elect to exercise the foregoing rights, you agree to comply with the following: (i)
customizations may only be used for teaching Authorized Training Sessions and Private
Training Sessions, and (ii) all customizations will comply with this agreement. For clarity, any
use of “customize” refers only to changing the order of slides and content, and/or not using
all the slides or content, it does not mean changing or modifying any slide or content.
●● 2.2 Separation of Components. The Licensed Content is licensed as a single unit and you
may not separate their components and install them on different devices.
●● 2.3 Redistribution of Licensed Content. Except as expressly provided in the use rights
above, you may not distribute any Licensed Content or any portion thereof (including any permit-
ted modifications) to any third parties without the express written permission of Microsoft.
●● 2.4 Third Party Notices. The Licensed Content may include third party code that Micro-
soft, not the third party, licenses to you under this agreement. Notices, if any, for the third party
code are included for your information only.
●● 2.5 Additional Terms. Some Licensed Content may contain components with additional
terms, conditions, and licenses regarding its use. Any non-conflicting terms in those conditions
and licenses also apply to your use of that respective component and supplements the terms
described in this agreement.
VIII EULA
laws and treaties. Microsoft or its suppliers own the title, copyright, and other intellectual property
rights in the Licensed Content.
6. EXPORT RESTRICTIONS. The Licensed Content is subject to United States export laws and regula-
tions. You must comply with all domestic and international export laws and regulations that apply to
the Licensed Content. These laws include restrictions on destinations, end users and end use. For
additional information, see www.microsoft.com/exporting.
7. SUPPORT SERVICES. Because the Licensed Content is provided “as is”, we are not obligated to
provide support services for it.
8. TERMINATION. Without prejudice to any other rights, Microsoft may terminate this agreement if you
fail to comply with the terms and conditions of this agreement. Upon termination of this agreement
for any reason, you will immediately stop all use of and delete and destroy all copies of the Licensed
Content in your possession or under your control.
9. LINKS TO THIRD PARTY SITES. You may link to third party sites through the use of the Licensed
Content. The third party sites are not under the control of Microsoft, and Microsoft is not responsible
for the contents of any third party sites, any links contained in third party sites, or any changes or
updates to third party sites. Microsoft is not responsible for webcasting or any other form of trans-
mission received from any third party sites. Microsoft is providing these links to third party sites to
you only as a convenience, and the inclusion of any link does not imply an endorsement by Microsoft
of the third party site.
10. ENTIRE AGREEMENT. This agreement, and any additional terms for the Trainer Content, updates and
supplements are the entire agreement for the Licensed Content, updates and supplements.
11. APPLICABLE LAW.
1. United States. If you acquired the Licensed Content in the United States, Washington state law
governs the interpretation of this agreement and applies to claims for breach of it, regardless of
conflict of laws principles. The laws of the state where you live govern all other claims, including
claims under state consumer protection laws, unfair competition laws, and in tort.
2. Outside the United States. If you acquired the Licensed Content in any other country, the laws of
that country apply.
12. LEGAL EFFECT. This agreement describes certain legal rights. You may have other rights under the
laws of your country. You may also have rights with respect to the party from whom you acquired the
Licensed Content. This agreement does not change your rights under the laws of your country if the
laws of your country do not permit it to do so.
13. DISCLAIMER OF WARRANTY. THE LICENSED CONTENT IS LICENSED "AS-IS" AND "AS AVAILA-
BLE." YOU BEAR THE RISK OF USING IT. MICROSOFT AND ITS RESPECTIVE AFFILIATES GIVES NO
EXPRESS WARRANTIES, GUARANTEES, OR CONDITIONS. YOU MAY HAVE ADDITIONAL CON-
SUMER RIGHTS UNDER YOUR LOCAL LAWS WHICH THIS AGREEMENT CANNOT CHANGE. TO
THE EXTENT PERMITTED UNDER YOUR LOCAL LAWS, MICROSOFT AND ITS RESPECTIVE AFFILI-
ATES EXCLUDES ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICU-
LAR PURPOSE AND NON-INFRINGEMENT.
14. LIMITATION ON AND EXCLUSION OF REMEDIES AND DAMAGES. YOU CAN RECOVER FROM
MICROSOFT, ITS RESPECTIVE AFFILIATES AND ITS SUPPLIERS ONLY DIRECT DAMAGES UP TO
US$5.00. YOU CANNOT RECOVER ANY OTHER DAMAGES, INCLUDING CONSEQUENTIAL, LOST
PROFITS, SPECIAL, INDIRECT OR INCIDENTAL DAMAGES.
X EULA
Prerequisites
●● Conceptual knowledge of security policies, requirements, zero trust architecture, and management of
hybrid environments
●● Working experience with zero trust strategies, applying security policies, and developing security
requirements based on business goals
6
●● Visibility, automation, and orchestration with Zero Trust - In our Zero Trust guides, we define the
approach to implement an end-to-end Zero Trust methodology across identities, endpoints and
devices, data, apps, infrastructure, and network. These activities increase your visibility, which gives
you better data for making trust decisions. With each Of these individual areas generating their own
relevant alerts, we
need an integrated capability to manage the resulting influx of data to better defend against threats
and validate trust in a transaction.
The following diagram visually illustrates the zero trust principles:
The MCRA also includes an overview of Zero Trust and a Zero Trust rapid modernization plan (RaMP).
Additionally, this includes other key information on security operations and key initiatives like protecting
from human operated ransomware, securing privileged access, moving beyond VPN, and more.
●● Comparison reference of security capabilities: Some organizations use MCRA to compare Microsoft's
architecture recommendations with what they already own and have implemented. Many organiza-
tions find that they weren't aware that they already own quite a bit of security architecture technolo-
gy.
●● Learn about Microsoft's integration investments: MCRA helps architects and technical teams identify
how to take advantage of integration points within Microsoft capabilities and existing security
capabilities.
●● Learn about cybersecurity: Some architects, particularly those new to cybersecurity, use this as a
learning tool to prepare for their first career or a career change.
The primary Cybersecurity Reference Architecture diagram represents the full organizational security
landscape, demonstrating how key Microsoft technologies fit into that landscape.
The table below reproduces the information from the diagram showing each domain, the Microsoft
products within it, a summary of the capability and some additional details.
The business outcome template focuses on simplified conversations that can quickly engage stakeholders
without getting too deep into the technical solution. By rapidly understanding and aligning the key
performance indicators (KPIs) and business drivers that are important to stakeholders, architects can
consider about high-level approaches and transformations before implementing security solutions.
1 https://docs.microsoft.com/learn/modules/build-cloud-governance-strategy-azure/9-accelerate-cloud-adoption-framework
15
The govern stage focuses on cloud governance. You can refer to the Cloud Adoption Framework for
recommended guidance as you build your cloud governance strategy.
To help build your adoption strategy, the Cloud Adoption Framework breaks out each stage into further
exercises and steps. Let's take a brief look at each stage.
Make a plan
Here, you build a plan that maps your aspirational goals to specific actions. A good plan helps ensure
that your efforts map to the desired business outcomes. Here are steps to build a solid plan:
1. Digital estate: Create an inventory of the existing digital assets and workloads that you plan to
migrate to the cloud.
2 https://azure.microsoft.com/overview/cloud-economics
16
2. Initial organizational alignment: Ensure the right people are involved in migration efforts, both from
a technical standpoint as well as from a cloud governance standpoint.
3. Skills readiness plan: Build a plan that helps individuals build the skills they need to operate in the
cloud.
4. Cloud adoption plan: Build a comprehensive plan that brings together the development, operations,
and business teams toward a shared cloud adoption goal.
Migrate
Here are the steps in the migrate process of this stage:
1. Migrate your first workload: Use the Azure migration guide to deploy your first project to the cloud.
2. Migration scenarios: Use additional in-depth guides to explore more complex migration scenarios.
3. Best practices: Check in with the Azure cloud migration best practices checklist to verify that you're
following recommended practices.
4. Process improvements: Identify ways to make the migration process scale while requiring less effort.
Innovate
Here are the steps in the innovate process of this stage:
1. Business value consensus: Verify that investments in new innovations add value to the business and
meet customer needs.
2. Azure innovation guide: Use this guide to accelerate development and build a minimum viable
product (MVP) for your idea.
3. Best practices: Verify that your progress maps to recommended practices before moving forward.
17
4. Feedback loops: Check in frequently with your customers to verify that you're building what they
need.
Govern
Here are the steps in the govern process of this stage:
1. Methodology: Consider your end state solution. Then define a methodology that incrementally takes
you from your first steps all the way to full cloud governance.
2. Benchmark: Use the governance benchmark tool3 to assess your current state and future state to
establish a vision for applying the framework.
3. Initial governance foundation: Create a Minimum Viable Product (MVP) that captures the first steps
of your governance plan.
4. Improve the initial governance foundation: Iteratively add governance controls that address
tangible risks as you progress toward your end state solution.
Manage
Here are the steps in the manage process of this stage:
1. Establish a management baseline: Define your minimum commitment to operations management. A
management baseline is the minimum set of tools and processes that should be applied to every
asset in an environment.
2. Define business commitments: Document supported workloads to establish operational commit-
ments with the business and agree on cloud management investments for each workload.
3. Expand the management baseline: Apply recommended best practices to iterate on your initial
management baseline.
4. Advanced operations and design principles: For workloads that require a higher level of business
commitment, perform a deeper architecture review to deliver on your resiliency and reliability com-
mitments.
3 https://cafbaseline.com/
18
4 https://docs.microsoft.com/assessments/?id=azure-architecture-review&mode=pre-assessment
19
Design considerations
Consider the following factors when designing BCDR for application
workloads:
●● Application and data availability requirements:
●● RTO and RPO requirements for each workload
●● Support for active-active and active-passive availability patterns
●● BCDR as a service for platform-as-a-service (PaaS) services:
●● Native DR and high-availability (HA) feature support
●● Geo-replication and DR capabilities for PaaS services
●● Support for multi-region deployments for failover, with component proximity for performance
●● Application operations with reduced functionality or degraded performance during an outage
●● Workload suitability for Availability Zones or availability sets
●● Data sharing and dependencies between zones
●● Availability Zones compared to availability sets impact on update domains
●● Percentage of workloads that can be under maintenance simultaneously
●● Availability Zones support for specific virtual machine (VM) stock-keeping units (SKUs); for exam-
ple, Azure Ultra Disk Storage requires using Availability Zones
●● Consistent backups for applications and data:
●● VM snapshots
●● Azure Backup Recovery Services vaults
●● Subscription limits restricting the number of Recovery Services vaults and the size of each vault
21
Design recommendations
The following design practices support BCDR for application workloads:
●● Employ Azure Site Recovery for Azure-to-Azure VM DR scenarios - Site Recovery uses real-time
replication and recovery automation to replicate workloads across regions. Built-in platform capabili-
ties for VM workloads meet low RPO and RTO requirements. You can use Site Recovery to run recov-
ery drills without affecting production workloads. You can also use Azure Policy to enable replication
and to audit VM protection.
●● Use native PaaS DR capabilities - Built-in PaaS features simplify both design and deployment
automation for replication and failover in workload architectures. Organizations that define service
standards can also audit and enforce the service configuration through Azure Policy.
●● Use Azure-native backup capabilities - Azure Backup and PaaS-native backup features remove the
need for third-party backup software and infrastructure. As with other native features, you can set,
audit, and enforce backup configurations with Azure Policy to ensure compliance with organization
requirements.
●● Use multiple regions and peering locations for ExpressRoute connectivity - A redundant hybrid
network architecture can help ensure uninterrupted cross-premises connectivity if an outage affects
an Azure region or peering provider location.
●● Avoid using overlapping IP address ranges for production and DR sites. - Production DR net-
works that use the same classless interdomain routing blocks require a failover process that can
complicate and delay application failover. When possible, plan for a BCDR network architecture that
provides concurrent connectivity to all sites.
5 https://docs.microsoft.com/azure/architecture/framework/
6 https://docs.microsoft.com/assessments/?id=azure-architecture-review&mode=pre-assessment
22
In traditional application development, there has been a focus on increasing the mean time between
failures (MTBF). This effort was spent trying to prevent the system from failing. In cloud computing, a
different mindset is required because of several factors:
●● Distributed systems are complex, and a failure at one point can potentially cascade throughout the
system
●● Costs for cloud environments are kept low through commodity hardware, so occasional hardware
failures should be expected
●● Applications often depend on external services, which may become temporarily unavailable or throttle
high-volume users
●● Today's users expect an application to be available 24/7 without ever going offline
These factors mean that cloud applications must be designed to expect occasional failures and recover
from them. Azure has many resiliency features already built into the platform. For example:
●● Azure Storage, SQL Database, and Cosmos DB provide built-in data replication across availability
zones and regions
●● Azure managed disks are automatically placed in different storage scale units to limit the effects of
hardware failures
●● Virtual machines (VMs) are spread across several fault domains in an availability set. A fault domain is
a group of VMs that share a common power source and network switch. Spreading VMs across fault
domains limits the impact of physical hardware failures, network outages, or power interruptions
●● Availability Zones are physically separate locations within each Azure region. Each zone comprises one
or more data centers equipped with independent power, cooling, and networking infrastructure. With
availability zones, one can design and operate applications and databases that automatically transi-
tion between zones without interruption, ensuring resiliency if one zone is affected. For more informa-
tion, go to Regions and Availability Zones in Azure7.
7 https://docs.microsoft.com/azure/availability-zones/az-overview
23
8 https://docs.microsoft.com/power-platform/admin/capacity-storage
25
●● Existing trials or subscriptions can't be merged onto another environment; instead, data and customi-
zations needed to move over
User accounts, identities, security groups, subscriptions, licenses, and storage can't be shared among
tenants. All tenants can have multiple environments associated with each specific tenant. Data isn't
shared across environments or tenants.
In a multi-tenant scenario, a licensed user associated with a tenant can only access one or more envi-
ronments mapped to the same tenant. To access another tenant, a user would need a separate license
and a unique set of sign-in credentials for that tenant.
For example, suppose User A has an account to access Tenant A. In that case, their license allows them to
access any and all environments created within Tenant A – if allowed by their administrator. If User A
needs to access environments within Tenant B, they will need an additional license.
●● Each tenant requires Microsoft Power Platform admin(s) with unique sign-in credentials, and each
tenant affiliate will manage its tenant separately in the administrator console
●● Multiple environments within a tenant are visible from the interface if the administrator has access
●● Licenses can't be reassigned between tenant enrollments. An enrolled affiliate can use license reduc-
tion under one enrollment and add licenses to another enrollment to facilitate this
●● On-premises Active Directory federation can't be established with more than one tenant unless there
are top-level domains that need to be federated with different tenants (for example, contoso.com and
fabricam.com)
Azure Arc simplifies governance and management by delivering a consistent multi-cloud and on-premis-
es management platform.
Azure Arc provides a centralized, unified way to:
●● Manage an entire environment by projecting existing non-Azure and/or on-premises resources into
Azure Resource Manager
●● Manage virtual machines, Kubernetes clusters, and databases as if they're running in Azure
●● Use familiar Azure services and management capabilities, regardless of where they live
●● Continue using traditional ITOps while introducing DevOps practices to support new cloud native
patterns in an environment
●● Configure custom locations as an abstraction layer on top of Azure Arc-enabled Kubernetes clusters
and cluster extensions
9 https://docs.microsoft.com/azure/architecture/vdc/networking-virtual-datacenter
28
network security devices sit between the internet and an Azure virtual network and have an interface on
both networks.
Based on the Zero Trust concept, consider using a perimeter network for all high security deployments in
order to enhance the level of network security and access control for Azure resources. Azure or a third
party solution can be used to provide another layer of security between assets and the internet.
Exercise
Tailwind Trader is a fictitious home improvement retailer. It operates retail hardware stores across the
globe and online.
29
Requirements
Tailwind Traders is planning significant changes to their
Azure Architecture. They have asked for your assistance with
recommendations and questions. Here are the specific requirements.
●● User Access and Productivity. The company has a new security
optimization project for customer environments. The CISO wants to
ensure all Azure resources are highly secured. For the architecture
review phase, user accounts should require:
●● Passwordless or MFA for all users and be able to measure risk
with threat intelligence & behavior analytics
●● Endpoints should require device integrity for access
●● Network should be able to establish basic traffic filtering and
segmentation to isolate business-critical or highly vulnerable
resources
30
Tasks
User Access and Productivity
●● Question 1: What are different ways Tailwind Traders could use the MCRA to require Passwordless or
MFA for all users and be able to measure risk with threat intelligence & behavior analytics?
●● Task 1: Design an architecture and explain your decision-making process.
●● Question 2: What are the different ways Tailwind Traders could require integrity for access for end-
points using the MCRA?
●● Task 2: Design a architecture and explain your decision-making process.
●● Question 3: What are the different ways Tailwind Traders could establish basic network traffic filtering
and segmentation to isolate business-critical or highly vulnerable resources using the MCRA?
●● Task 3: Propose at least two ways of meeting the requirements. Explain your final decision.
How are you incorporating the Microsoft Cybersecurity Reference Architectures (MCRA) to produce a
secured, high available, and efficient cloud architecture?
Summary
In this module, you've learned how to build an overall security
strategy and architecture with zero trust in mind. You have learned
different strategies for designing, defining, and recommending an
organizational security strategy and architecture. You should now be
able to:
●● Develop integration points in an architecture
●● Develop security requirements based on business goals
●● Translate security requirements into technical capabilities
●● Design security for a resiliency strategy
●● Design a security strategy for hybrid and multi-tenant environments
●● Design technical and governance strategies for traffic filtering and
segmentation
10 https://docs.microsoft.com/security/cybersecurity-reference-architecture/mcra
11 https://docs.microsoft.com/azure/cloud-adoption-framework/govern/
12 https://docs.microsoft.com/azure/cloud-adoption-framework/strategy/balance-competing-priorities
13 https://docs.microsoft.com/compliance/assurance/assurance-resiliency-and-continuity
31
14 https://docs.microsoft.com/azure/cloud-adoption-framework/ready/azure-best-practices/organize-subscriptions
15 https://docs.microsoft.com/azure/governance/policy/concepts/recommended-policies
16 https://docs.microsoft.com/learn/modules/build-cloud-governance-strategy-azure/
17 https://docs.microsoft.com/learn/modules/azure-architecture-fundamentals/
18 https://docs.microsoft.com/learn/modules/microsoft-cloud-adoption-framework-for-azure/
32
Prerequisites
Conceptual knowledge of security policies, requirements, zero trust architecture, and management of
hybrid environments
Working experience with zero trust strategies, applying security policies, and developing security require-
ments based on business goals
19 https://aka.ms/ZTIdentity
20 https://aka.ms/ZTEndpoints
21 https://aka.ms/ZTData
22 https://aka.ms/ZTApplications
23 https://aka.ms/ZTInfrastructure
24 https://aka.ms/ZTNetwork
33
With each of these individual areas generating its relevant alerts, an integrated capability is needed to
manage the resulting influx of data to better defend against threats and validate trust in a transaction.
The following abilities are needed:
●● Detect threats and vulnerabilities.
●● Investigate.
●● Respond.
●● Hunt.
●● Provide additional context through threat analytics.
●● Assess vulnerabilities.
●● Get help from world class experts
●● Prevent or block events from happening across the pillars.
Managing threats includes reactive and proactive detection and requires tools that support both.
●● Reactive detection: Incidents are triggered from one of the six pillars that can be investigated.
Additionally, a management product like a SIEM will likely support another layer of analytics that will
enrich and correlate data, resulting in flagging an incident as bad. The next step would then be to
investigate to get the full narrative of the attack.
●● Proactive detection: Hunting to the data is applied to prove a compromised hypothesis. Threat
hunting starts with the assumption there has been a breach, hence hunt for proof that there's indeed
a breach.
Each minute that an attacker has in the environment allows them to continue to conduct attack opera-
tions and access sensitive or valuable systems. Maintaining control over environment ensures that
compliancy with industry standards, such as information security management and corporate or organi-
zational standards, such as ensuring that network data is encrypted.
An efficient Security Operations Strategy is most beneficial when there are:
●● Multiple engineering teams working in Azure.
34
Metrics
Metrics drive behavior, so measuring success is a critical element to
get right. Metrics translate culture into clear measurable goals that
drive outcomes.
We've learned that it's critical to consider what you measure, and the
ways that you focus on and enforce those metrics. Recognize that
security operations must manage significant variables that are out of
their direct control, like attacks and attackers. Any deviations from
targets should be viewed primarily as a learning opportunity for process
or tool improvement, rather than assumed to be a failure by the SOC to
meet a goal.
The main metrics to focus on that have a direct influence on
organizational risk are:
●● Mean time to acknowledge (MTTA): Responsiveness is one of the
few elements SecOps has more direct control over. Measure the time
between an alert, like when the light starts to blink, and when an
analyst sees that alert and begins the investigation. Improving this
responsiveness requires that analysts don't waste time
investigating false positives. It can be achieved with ruthless
prioritization, ensuring that any alert feed that requires an
analyst response must have a track record of 90 percent true
positive detections.
37
Recommendations
●● Make all things observable. Once a solution is deployed and
running, logs and traces are your primary insight into the
system. Tracing records a path through the system and is useful to
pinpoint bottlenecks, performance issues, and failure
points. Logging captures individual events such as application
state changes, errors, and exceptions. Log in production, or else
you lose insight at the very times when you need it the most.
●● Instrument for monitoring. Monitoring gives insight into how
well (or poorly) an application performs in terms of availability,
performance, and system health. For example, monitoring indefinite
if SLAs are being met. Monitoring happens during the normal
operation of the system. It should be as close to real-time as
38
25 https://docs.microsoft.com/azure/architecture/best-practices/monitoring
39
26 https://docs.microsoft.com/azure/azure-monitor/essentials/platform-logs-overview
27 https://docs.microsoft.com/azure/azure-monitor/essentials/platform-logs-overview
28 https://docs.microsoft.com/azure/security-center/security-center-managing-and-responding-alerts
29 https://docs.microsoft.com/azure/security-center/security-center-introduction
41
Product/Service Article
Dynamics CRM Identify sensitive entities in your solution and
implement change auditing (https://docs.
microsoft.com/azure/security/develop/threat-mode-
ling-tool-auditing-and-logging#sensitive-entities)
Web Application Ensure that auditing and logging is enforced
on the application (https://docs.microsoft.com/
azure/security/develop/threat-modeling-tool-audit-
ing-and-logging#auditing)
Ensure that log rotation and separation are in
place (https://docs.microsoft.com/azure/security/
develop/threat-modeling-tool-auditing-and-log-
ging#log-rotation)
Ensure that the application does not log
sensitive user data (https://docs.microsoft.com/
azure/security/develop/threat-modeling-tool-audit-
ing-and-logging#log-sensitive-data)
42
Product/Service Article
Ensure that Audit and Log Files have Restricted
Access (https://docs.microsoft.com/azure/security/
develop/threat-modeling-tool-auditing-and-log-
ging#log-restricted-access)
Ensure that User Management Events are
Logged (https://docs.microsoft.com/azure/security/
develop/threat-modeling-tool-auditing-and-log-
ging#user-management)
Ensure that the system has inbuilt defenses
against misuse (https://docs.microsoft.com/azure/
security/develop/threat-modeling-tool-audit-
ing-and-logging#inbuilt-defenses)
Enable diagnostics logging for web apps in
Azure App Service (https://docs.microsoft.com/
azure/security/develop/threat-modeling-tool-audit-
ing-and-logging#diagnostics-logging)
Database Ensure that login auditing is enabled on SQL
Server (https://docs.microsoft.com/azure/security/
develop/threat-modeling-tool-auditing-and-log-
ging#identify-sensitive-entities)
Enable Threat detection on Azure SQL (https://
docs.microsoft.com/azure/security/develop/
threat-modeling-tool-auditing-and-logging#-
threat-detection)
Azure Storage Use Azure Storage Analytics to audit access of
Azure Storage (https://docs.microsoft.com/azure/
security/develop/threat-modeling-tool-audit-
ing-and-logging#analytics)
WCF Implement sufficient Logging (https://docs.
microsoft.com/azure/security/develop/threat-mode-
ling-tool-auditing-and-logging#sufficient-logging)
Implement sufficient Audit Failure Handling
(https://docs.microsoft.com/azure/security/develop/
threat-modeling-tool-auditing-and-logging#au-
dit-failure-handling)
Web API Ensure that auditing and logging is enforced
on Web API (https://docs.microsoft.com/azure/
security/develop/threat-modeling-tool-auditing-
and-logging#logging-web-api)
IoT Field Gateway Ensure that appropriate auditing and logging is
enforced on Field Gateway (https://docs.micro-
soft.com/azure/security/develop/threat-mode-
ling-tool-auditing-and-logging#logging-field-gate-
way)
43
Product/Service Article
IoT Cloud Gateway Ensure that appropriate auditing and logging is
enforced on Cloud Gateway (https://docs.
microsoft.com/azure/security/develop/threat-mode-
ling-tool-auditing-and-logging#logging-cloud-
gateway)
●● Reconnaissance: The observation stage where attackers assess networks and services to identify
possible targets and techniques to gain entry.
●● Intrusion: Attackers use the knowledge gained in the reconnaissance phase to get access to a part of
a network. This often involves exploring a flaw or security hole.
●● Exploitation: This phase involves exploiting vulnerabilities and inserting malicious code onto the
system to get more access.
●● Privilege Escalation: Attackers often try to gain administrative access to compromised systems to get
access to more critical data and move into other connected systems.
●● Lateral Movement: This is the act of moving laterally to connected servers and gaining greater access
to potential data.
●● Obfuscation / Anti-forensics: Attackers need to cover their entry to successfully pull off a cyberat-
tack. They will often compromise data and clear audit logs to prevent detection by any security team.
●● Denial of Service: This phase involves disrupting normal access for users and systems to keep the
attack from being monitored, tracked, or blocked.
●● Exfiltration: The final extraction stage: getting valuable data out of the compromised systems.
Different types of attacks are associated with each stage, targeting various subsystems.
44
Unified Operations
The primary objective of unified operations is to create as much process
consistency as possible across deployments. No cloud service provider
will be able to reach 100% feature parity across all hybrid,
multi-cloud, and edge deployments. However, the provider should be able
to deliver baseline feature sets common across all deployments so that
your governance30 and
operations management31
processes remain consistent.
30 https://docs.microsoft.com/azure/cloud-adoption-framework/scenarios/hybrid/govern
31 https://docs.microsoft.com/azure/cloud-adoption-framework/scenarios/hybrid/manage
45
32 https://docs.microsoft.com/azure/cloud-adoption-framework/manage/azure-management-guide/platform-specialization
33 https://docs.microsoft.com/azure/cloud-adoption-framework/manage/azure-management-guide/workload-specialization
46
34 https://docs.microsoft.com/azure/security/fundamentals/operational-security
47
Azure Monitor
Azure Monitor36 collects
data from managed sources into central data stores. This data can
include events, performance data, or custom data provided through the
API. After the data is collected, it is available for alerting,
analysis, and export.
Data can be consolidated from various sources and combined from Azure
services with existing on-premises environments. Azure Monitor logs also
clearly separate the data collection from the action taken on that data
so that all actions are available to all kinds of data.
Automation
Azure Automation37 provides
a way to automate the manual, long-running, error-prone, and frequently
repeated tasks commonly performed in a cloud and enterprise environment.
It saves time and increases the reliability of administrative tasks. It
even schedules these tasks to be automatically performed at regular
intervals. Processes can be automated using runbooks or configuration
management using Desired State Configuration.
Backup
Azure Backup38 is
the Azure-based service that you can use to back up (or protect) and
restore your data in the Microsoft Cloud. Azure Backup replaces existing
on-premises or off-site backup solutions with a cloud-based solution
that's reliable, secure, and cost-competitive.
Azure Backup offers components to download and deploy on the appropriate
computer or server or in the cloud. The component or agent deployed
depends on what needs to be protected. All Azure Backup components
(whether protecting data on-premises or in the cloud) can be used to
back up data to an Azure Recovery Services vault in Azure.
For more information, see the Azure Backup components table39.
35 https://docs.microsoft.com/azure/azure-monitor/overview
36 https://docs.microsoft.com/azure/azure-monitor/overview
37 https://docs.microsoft.com/azure/automation/automation-intro
38 https://docs.microsoft.com/azure/backup/backup-overview
39 https://docs.microsoft.com/azure/backup/backup-overview#what-can-i-back-up
48
Site Recovery
Azure Site Recovery40 provides
business continuity by orchestrating the replication of on-premises
virtual and physical machines to Azure or a secondary site. If primary
sites are unavailable, failover to the secondary location so that users
can keep working. Fail back when systems return to working order. Use
Microsoft Defender for Cloud to perform more intelligent and effective
threat detection.
40 https://azure.microsoft.com/documentation/services/site-recovery
41 https://docs.microsoft.com/azure/active-directory/manage-apps/what-is-application-management
42 https://azuremarketplace.microsoft.com/marketplace/apps/Microsoft.AzureActiveDirectory
43 https://docs.microsoft.com/azure/security/fundamentals/identity-management-overview#security-monitoring-alerts-and-machine-
learning-based-reports
44 https://docs.microsoft.com/azure/active-directory/authentication/concept-mfa-howitworks
45 https://azure.microsoft.com/resources/videos/self-service-password-reset-azure-ad/
46 https://support.microsoft.com/account-billing/reset-your-work-or-school-password-using-security-info-23dde81f-08bb-4776-ba72-
e6b72b9dda9e
47 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure
48 https://docs.microsoft.com/azure/role-based-access-control/overview
49 https://docs.microsoft.com/azure/active-directory/hybrid/whatis-hybrid-identity
50 https://docs.microsoft.com/azure/active-directory/reports-monitoring/concept-audit-logs
51 https://docs.microsoft.com/azure/security-center/security-center-managing-and-responding-alerts
49
52 https://docs.microsoft.com/azure/security-center/security-center-introduction
53 https://docs.microsoft.com/azure/security-center/security-center-introduction
54 https://docs.microsoft.com/azure/role-based-access-control/role-assignments-portal
55 https://docs.microsoft.com/azure/role-based-access-control/built-in-roles
50
Tools Purpose
Azure Monitor (https://docs.microsoft.com/azure/ Event logs from application and Azure services.
azure-monitor/overview)
Log Analytics (https://docs.microsoft.com/azure/ A unique environment for log data from Azure
azure-monitor/logs/log-analytics-workspace-over- Monitor and other Azure services such as Micro-
view) soft Sentinel and Microsoft Defender for Cloud.
Azure Network Security Group (NSG) (https:// Visibility into network activities.
docs.microsoft.com/azure/virtual-network/net-
work-security-groups-overview)
Azure Information Protection (https://docs. You share secure email, documents, and sensitive
microsoft.com/azure/information-protection/ data outside your company.
what-is-information-protection)
Microsoft Sentinel (https://docs.microsoft.com/ Centralized Security Information and Event
azure/sentinel/overview) Management (SIEM) to get enterprise-wide
visibility into logs.
Microsoft Defender for Cloud (https://docs. Alert generation. Use a security playbook in
microsoft.com/azure/security-center/securi- response to an alert.
ty-center-intro)
56 https://docs.microsoft.com/azure/sentinel
51
The Azure enrollment portal admin contact information includes details that notify security operations.
Contact information is an email address and phone number.
57 https://docs.microsoft.com/azure/storage/common/storage-analytics
58 https://docs.microsoft.com/azure/sentinel/overview
59 https://docs.microsoft.com/azure/security-center/secure-score-security-controls
60 https://docs.microsoft.com/azure/security-center/security-center-recommendations
52
Log, one of the logs available through Azure Monitor. Azure Monitor offers a consolidated pipeline for
routing any of your monitoring data into a SIEM tool. See Stream alerts to a SIEM, SOAR, or IT Service
Management solution61 for instructions. If using Microsoft Sentinel, see Connect Microsoft Defender
for Cloud62.
Best practice: Integrate Azure logs with your SIEM.
Detail:Use Azure Monitor to gather and export data63. This practice is critical for enabling security
incident investigation, and online log retention is limited. If using Microsoft Sentinel, see Connect data
sources64.
Best practice: Speed up investigation and hunting processes and reduce false positives by integrating
Endpoint Detection and Response (EDR) capabilities into an attack investigation.
Detail: Enable the Microsoft Defender for Endpoint integration65 via a Defender for Cloud security
policy. Consider using Microsoft Sentinel for threat hunting and incident response.
61 https://docs.microsoft.com/azure/security-center/export-to-siem
62 https://docs.microsoft.com/azure/sentinel/connect-azure-security-center
63 https://docs.microsoft.com/azure/azure-monitor/overview#integrate-and-export-data
64 https://docs.microsoft.com/azure/sentinel/connect-data-sources
65 https://docs.microsoft.com/azure/security-center/security-center-wdatp#enable-the-microsoft-defender-for-endpoint-integration
66 https://docs.microsoft.com/azure/network-watcher/network-watcher-monitoring-overview
67 https://docs.microsoft.com/azure/network-watcher/network-watcher-alert-triggered-packet-capture
68 https://docs.microsoft.com/azure/network-watcher/network-watcher-nsg-flow-logging-overview
69 https://docs.microsoft.com/azure/network-watcher/network-watcher-diagnose-on-premises-connectivity
53
stored in a record called risk detection. Risk detections are recorded in Azure AD security reports. For
more information, read about the users at risk security report and the risky sign-ins security report.
Best practice: Monitor for suspicious actions related to your user accounts.
Detail: Monitor for users at risk70 and risky sign-ins71 by using Azure AD security reports.
70 https://docs.microsoft.com/azure/active-directory/identity-protection/overview-identity-protection
71 https://docs.microsoft.com/azure/active-directory/identity-protection/overview-identity-protection
72 https://docs.microsoft.com/microsoft-365/security/defender/investigate-incidents?view=o365-worldwide&preserve-view=true
54
4. Resolve the incident or escalate to a triage team member if the situation requires some human
judgment.
Workflow Automation
There are a few key technologies to be used for workflow automation in
Azure:
●● Azure Logic Apps - Azure Logic Apps is a cloud-based platform for creating and running automated
workflows that integrate your apps, data, services, and systems. With this platform, you can quickly
develop highly scalable integration solutions for your enterprise and business-to-business (B2B)
scenarios. As a member of Azure Integration Services, Azure Logic Apps simplifies the way that you
connect legacy, modern, and cutting-edge systems across cloud, on premises, and hybrid environ-
ments. For more information on Azure Logic Apps, see Overview for Azure Logic Apps73.
●● Microsoft Defender for cloud - the workflow automation feature of Microsoft Defender for Cloud
can trigger Logic Apps on security alerts, recommendations, and changes to regulatory compliance.
For more information on creating workflow automation with Defender for Cloud, see Automate
responses to Defender for cloud triggers74
●● Microsoft Graph security - With Azure Logic Apps and the Microsoft Graph Security connector, you
can improve how your app detects, protects, and responds to threats by creating automated work-
flows for integrating Microsoft security products, services, and partners. For example, you can create
Microsoft Defender for Cloud playbooks that monitor and manage Microsoft Graph Security entities,
such as alerts. For more information on the integration, see Improve threat protection by integrat-
ing security operations with Microsoft Graph Security & Azure Logic Apps75.
●● Microsoft Sentinel – Sentinel provides both automation rules and playbooks. Automation rules help
you triage incidents by changing incident attributes or running playbooks. Playbooks are collections
of procedures that can be run from Microsoft Sentinel in response to an alert or incident.
73 https://docs.microsoft.com/azure/logic-apps/logic-apps-overview
74 https://docs.microsoft.com/azure/defender-for-cloud/workflow-automation
75 https://docs.microsoft.com/azure/connectors/connectors-integrate-security-operations-create-api-microsoft-graph-security
56
2. To define a new workflow, click Add workflow automation. The options pane for your new automa-
tion opens. Here you can enter:
1. A name and description for the automation.
2. The triggers that will initiate this automatic workflow. For example, you might want your Logic App
to run when a security alert that contains “SQL” is generated.
3. The Logic App that will run when your trigger conditions are met.
57
3. From the Actions section, select visit the Logic Apps page to begin the Logic App creation process.
You'll be taken to Azure Logic Apps.
4. Select Add.
58
5. Enter a name, resource group, and location, and select Review and create > Create. The message
Deployment is in progress appears. Wait for the deployment complete notification to appear and
select Go to resource from the notification.
6. In your new logic app, you can choose from built-in, predefined templates from the security category.
Or you can define a custom flow of events to occur when this process is triggered. The logic app
designer supports these triggers from Defender for Cloud:
●● When a Microsoft Defender for Cloud Recommendation is created or triggered - If your logic
app relies on a recommendation that gets deprecated or replaced, your automation will stop
working, and you'll need to update the trigger. To track changes to recommendations, use the
release notes76.
●● When a Defender for Cloud Alert is created or triggered - You can customize the trigger so
that it relates only to alerts with the severity levels that interest you.
●● When a Defender for Cloud regulatory compliance assessment is created or triggered - Trig-
ger automations based on updates to regulatory compliance assessments.
7. After you've defined your logic app, return to the workflow automation definition pane (“Add work-
flow automation”). Click Refresh to ensure your new Logic App is available for selection.
8. Select your logic app and save the automation. Note that the Logic App dropdown only shows Logic
Apps with supporting Defender for Cloud connectors mentioned above.
Add triggers
In Azure Logic Apps, every logic app must start with a trigger77, which fires when a specific event hap-
pens or when a specific condition is met. Each time that the trigger fires, the Logic Apps engine creates a
logic app instance and starts running your app's workflow.
When a trigger fires, the trigger processes all the new alerts. If no
alerts are received, the trigger run is skipped. The next trigger poll
76 https://docs.microsoft.com/azure/defender-for-cloud/release-notes
77 https://docs.microsoft.com/azure/logic-apps/logic-apps-overview#logic-app-concepts
59
Manage alerts
To filter, sort, or get the most recent results, provide only the ODATA query parameters supported by
Microsoft Graph79. Don't specify the complete base URL or the HTTP action, for example, <https://
graph.microsoft.com/v1.0/security/alerts>, or the GET or PATCH operation.
For more information about the queries you can use with this connector, see the Microsoft Graph
Security alerts reference documentation80.
To build enhanced experiences with this connector, learn more about the schema properties alerts81
that the connector supports.
Action Description
Get alerts Get alerts filtered based on one or more alert
properties, for example, Provider eq ‘Azure
Security Center’ or 'Palo Alto Networks'.
Get alert by ID Get a specific alert based on the alert ID.
Update alert Update a specific alert based on the alert ID. To
make sure you pass the required and editable
properties in your request, see the editable
properties for alerts. For example, to assign an
alert to a security analyst so they can investigate,
you can update the alert's Assigned to property.
78 https://docs.microsoft.com/azure/connectors/connectors-integrate-security-operations-create-api-microsoft-graph-security#add-triggers
79 https://docs.microsoft.com/graph/query-parameters
80 https://docs.microsoft.com/graph/api/alert-list
81 https://docs.microsoft.com/graph/api/resources/alert
82 https://docs.microsoft.com/graph/api/resources/subscription
83 https://docs.microsoft.com/graph/api/resources/webhooks
60
ed by Microsoft Graph84 to the Microsoft Graph entity construct and include security/alerts followed by
the ODATA query. Don't include the base URL, for example, https://graph.microsoft.com/v1.0. Instead,
use the format in this example:
security/alerts?\$filter=status eq 'NewAlert'
Action Description
Create subscriptions Create a subscription that notifies you about any
changes. You can filter this subscription for the
specific alert types you want. For example, you can
create a subscription that notifies you about high
severity alerts.
Get active subscriptions Get unexpired subscriptions.
Update subscription Update a subscription by providing the subscrip-
tion ID. For example, to extend your subscription,
you can update the subscription's expirationDate-
Time property.
Delete subscription Delete a subscription by providing the subscrip-
tion ID.
1. You can specify analytics rules or conditions for the automation rule to take effect.
84 https://docs.microsoft.com/graph/query-parameters
85 https://docs.microsoft.com/graph/query-parameters
86 https://docs.microsoft.com/graph/api/tiindicators-list
87 https://docs.microsoft.com/graph/api/resources/tiindicator
88 https://docs.microsoft.com/azure/connectors/connectors-integrate-security-operations-create-api-microsoft-graph-security#manage-
threat-intelligence-indicators
61
2. You can also specify what actions you want the automation rule to take – such as assigning an
owner or running a playbook.
3. You can also create an analytics rule in response to alerts.
For more detailed instructions on creating playbooks, see Use playbooks with automation rules in
Microsoft Sentinel89.
89 https://docs.microsoft.com/azure/sentinel/tutorial-respond-threats-playbook?tabs=LAC
62
Preparation
Preparation enables rapid response when an incident occurs and may even prevent incidents in the first
place. Azure dedicates significant resources to preparing for security incidents.
Organizations using Azure services should provide employees with training regarding security incidents
and response procedures appropriate to their role. Every employee should be receiving training upon
joining and annual refresher training every year thereafter. The training should be designed to provide
the employee with a basic understanding of the Organization's approach to security so that upon
completion of training, all employees understand:
●● The definition of a security incident
●● The responsibility of all employees to report security incidents
●● How to escalate a potential security incident
●● How security incident response teams respond to security incidents
●● Special concerns regarding privacy, particularly customer privacy
●● Where to find more information about security and privacy and escalation contacts
●● Any other relevant security areas (as needed)
The appropriate employees should receive refresher training on security annually. The annual refresher
training focuses on:
●● Any changes made to the standard operating procedures in the preceding year
63
Containment
The primary goal of containment is to limit harm to systems, applications, customers, and customer data.
During this phase, the Security Response team should work with affected service teams to limit the
impact of the security incident and prevent further damage. All automated response solutions within
Azure should help the team contain the incident.
The data collection and analysis should continue through the containment phase to ensure that the
incident's root cause has been correctly identified and that all impacted services and tenants are included
64
in the eradication and recovery plan. Successfully tracing all impacted services makes full eradication and
recovery possible.
Eradication
Eradication is the process of eliminating the root cause of the security incident with a high degree of
confidence. The goal of eradication is twofold: to evict the adversary completely from the environment
and mitigate any vulnerabilities that contributed to the incident or could enable the adversary to reenter
the environment.
Eradication steps to evict the adversary and mitigate vulnerabilities are based on the analysis performed
in the previous incident response phases. The Security Response team should coordinate with affected
service teams to ensure the threat is successfully removed from the environment. Recovery isn't possible
until the threat has been removed and its underlying causes have been resolved.
Recovery
When the Security Response team is confident the adversary has been evicted from the environment, and
known vulnerabilities have been remediated, the team should work with affected service teams to initiate
recovery. Recovery brings affected services to a known secure configuration. The recovery process
includes identifying the last known good state of the service, restoring from backups to this state, and
confirming the restored state mitigates the vulnerabilities that contributed to the incident.
A key aspect of the recovery process is enhanced detection controls to validate that the recovery plan has
been successfully executed and that no signs of breach remain within the environment. Examples of
additional detection controls include increased network-level monitoring, targeted alerting for attack
vectors identified during the incident response process, and additional security team vigilance for critical
resources. Enhanced monitoring helps to ensure that eradication was successful and that the adversary is
unable to reenter the environment.
Post-Incident Activity
After the incident has been resolved, select security incidents, especially customer-impacting or resulting
in a data breach, undergo a full incident post-mortem. The post-mortem process should be designed to
identify technical lapses, procedural failures, manual errors, and other process flaws that might have
contributed to the incident or been identified during the incident response process. The process should
include the following:
A deep analysis of the root cause and investigation to identify any opportunities to improve system
security or the security incident response process.
Discussion with Product Group Subject Matter Experts along with Security and Privacy Experts to identify
opportunities for improvements in process, training, or technology.
Implementation of new automated monitoring and detection mechanisms to discover similar issues in
the future.
Recording any findings as ticketed work items or bugs to be addressed by product teams as part of our
normal Security Development Lifecycle and assigning these items to appropriate owning teams for
follow-up.
Discussing the results of the completed post-mortem in monthly security incident review meetings
conducted by senior management.
65
Continuous Improvement
Lessons learned from the security incident should be implemented with coordination from the Security
Response team to help prevent future incidents and improve detection and response capabilities.
Continuous improvement is paramount for effective and efficient incident response. Post-incident
activities ensure that lessons learned from the security incident are successfully implemented across the
enterprise to defend organizations and their customers against evolving threats.
Alert definitions
Alert definitions are contextual attributes that can be used
collectively to identify early clues on a possible cybersecurity attack.
These indicators are typically a combination of activities,
characteristics, and actions taken by an attacker to successfully
achieve the objective of an attack. Monitoring these combinations of
attributes is critical in gaining a vantage point against attacks. These
possibly interfere with the chain of events before an attacker's
objective is reached.
90 https://docs.microsoft.com/azure/sentinel/iot-solution?tabs=use-out-of-the-box-analytics-rules-recommended
68
91 https://docs.microsoft.com/device-builders/index.md
92 https://docs.microsoft.com/azure/defender-for-cloud/alerts-overview#detect-threats
93 https://docs.microsoft.com/azure/defender-for-cloud/managing-and-responding-alerts
69
Best Practices
Microsoft recommends different ways to use threat intelligence feeds to
enhance your security analysts' ability to detect and prioritize known
threats.
●● You can use one of many available integrated threat intelligence platform (TIP) products, you can
connect to TAXII servers to take advantage of any STIX-compatible threat intelligence source, and you
can also make use of any custom solutions that can communicate directly with the
Microsoft Graph Security tiIndicators API99.
●● You can also connect to threat intelligence sources from playbooks
to enrich incidents with TI information to help direct investigation
and response actions.
94 https://security.microsoft.com/
95 https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-ti?view=o365-worldwide&preserve-view=true#explorer
96 https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-ti?view=o365-worldwide&preserve-view=true#incidents
97 https://docs.microsoft.com/microsoft-365/security/office-365-security/attack-simulation-training?view=o365-worldwide&preserve-
view=true
98 https://docs.microsoft.com/microsoft-365/security/office-365-security/automated-investigation-response-office?view=o365-
worldwide&preserve-view=true
99 https://docs.microsoft.com/graph/api/resources/tiindicator
100 https://steyer.sharepoint.com/sites/MSLearnSC_100/Learning%20Paths%20and%20Modules/LP1%20Design%20a%20Zero%20Trust%20
strategy%20and%20architecture/docs.microsoft/com/azure/sentinel/threat-intelligence-integration
70
101 https://docs.microsoft.com/security/compass/security-operations-videos-and-decks
102 https://docs.microsoft.com/azure/sentinel/threat-intelligence-integration#integrated-threat-intelligence-platform-products
71
●● Detect threats and generate security alerts and incidents using the built-in Analytics rule templates
based on your imported threat intelligence.
●● Visualize key information about your imported threat intelligence in Microsoft Sentinel with the Threat
Intelligence workbook.
Alert definitions
Alert definitions are contextual attributes that can be used collectively to identify early clues on a possible
cybersecurity attack. These indicators are typically a combination of activities, characteristics, and actions
taken by an attacker to successfully achieve the objective of an attack. Monitoring these combinations of
attributes is critical in gaining a vantage point against attacks and possibly interfering with the chain of
events before an attacker's objective is reached.
Defender for IoT has both agent-based and agentless monitoring solutions:
●● For end-user organizations, Microsoft Defender for IoT provides agentless, network-layer monitoring
that integrates smoothly with industrial equipment and SOC tools. You can deploy Microsoft Defender
for IoT in Azure-connected and hybrid environments or completely on-premises.
●● For IoT device builders, Microsoft Defender for IoT also offers a lightweight micro-agent that supports
standard IoT operating systems, such as Linux and RTOS. The Microsoft Defender device builder agent
helps you ensure that security is built into your IoT/OT projects from the cloud. For more information,
see Microsoft Defender for IoT for device builders documentation105
103 https://docs.microsoft.com/azure/sentinel/iot-solution?tabs=use-out-of-the-box-analytics-rules-recommended
104 https://docs.microsoft.com/azure/sentinel/iot-solution
105 https://docs.microsoft.com/device-builders/index.md
106 https://docs.microsoft.com/azure/defender-for-cloud/alerts-overview#detect-threats
107 https://docs.microsoft.com/azure/defender-for-cloud/managing-and-responding-alerts
73
Best Practices
Microsoft recommends different ways to use threat intelligence feeds to enhance your security analysts'
ability to detect and prioritize known threats.
●● You can use one of many available integrated threat intelligence platform (TIP) products, you can
connect to TAXII servers to take advantage of any STIX-compatible threat intelligence source, and you
can also make use of any custom solutions that can communicate directly with the Microsoft Graph
Security tiIndicators API113.
●● You can also connect to threat intelligence sources from playbooks to enrich incidents with TI infor-
mation to help direct investigation and response actions.
108 https://security.microsoft.com/
109 https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-ti?view=o365-worldwide&preserve-view=true#explorer
110 https://docs.microsoft.com/microsoft-365/security/office-365-security/office-365-ti?view=o365-worldwide&preserve-view=true#incidents
111 https://docs.microsoft.com/microsoft-365/security/office-365-security/attack-simulation-training?view=o365-worldwide&preserve-
view=true
112 https://docs.microsoft.com/microsoft-365/security/office-365-security/automated-investigation-response-office?view=o365-
worldwide&preserve-view=true
113 https://docs.microsoft.com/graph/api/resources/tiindicator
74
Exercise
Case Study: Design a Security Operations Solution
Meet Tailwind Traders
Requirements
Tailwind Traders is planning to make some significant changes to their
Security Operations. They have asked for your assistance with
recommendations and questions. Here are the specific requirements.
●● Security and Activity logs The company has a new security
optimization project for customer environments. The CISO wants to
ensure that all available Azure logs are sourced and correlated
within Microsoft Sentinel.
75
Tasks
Security and Activity Logs
●● Question What are different ways Tailwind Traders could collect events, performance data, or custom
data provided through the API?
●● Task Evaluate a solution and explain your decision-making process.
●● Question What are the different ways Tailwind Traders could prevent, detect, and respond to threats
with increased visibility into (and control over) the security of your Azure resources?
●● Task Evaluate a solution and explain your decision-making process.
●● Question How are you incorporating Azure Security Operations services available to users to protect
their data, applications, and other assets in Microsoft Azure?
Summary
In this module, you've learned how to build an overall security
operations strategy with zero trust in mind. You have learned different
strategies for designing, defining, and recommending an organizational
security strategy and architecture. You should now be able to:
●● Design a logging and auditing security strategy
●● Develop security operations for hybrid and multi-cloud environments
●● Design a strategy for Security Information and Event Management
(SIEM) and Security Orchestration, Automation, and Response (SOAR)
●● Evaluate security workflows
76
114 https://docs.microsoft.com/security/compass/security-operations
115 https://docs.microsoft.com/azure/security/fundamentals/log-audit
116 https://docs.microsoft.com/microsoft-365/security/defender-endpoint/configure-siem?view=o365-worldwide&preserve-view=true
117 https://docs.microsoft.com/shows/azure-friday/improve-security-with-azure-sentinel-a-cloud-native-siem-and-soar-solution
118 https://docs.microsoft.com/compliance/assurance/assurance-security-incident-management
119 https://docs.microsoft.com/azure/architecture/example-scenario/data/sentinel-threat-intelligence
120 https://docs.microsoft.com/azure/sentinel/get-visibility
121 https://docs.microsoft.com/azure/defender-for-iot/organizations/overview
122 https://docs.microsoft.com/microsoft-365/security/defender-endpoint/threat-indicator-concepts?view=o365-worldwide&preserve-
view=true
123 https://docs.microsoft.com/learn/modules/connect-threat-indicators-to-azure-sentinel/2-plan-for-threat-intelligence-connectors
124 https://docs.microsoft.com/learn/modules/intro-to-azure-sentinel/4-when-to-use-azure-sentinel
125 https://docs.microsoft.com/learn/paths/sc-200-connect-logs-to-azure-sentinel/
77
Prerequisites
●● Conceptual knowledge of security policies, requirements, zero trust architecture, and management of
hybrid environments.
●● Working experience with zero trust strategies, applying security policies, and developing security
requirements based on business goals.
126 https://aka.ms/ZTNetwork
127 https://aka.ms/ZTDevices
128 https://aka.ms/ZTApplications
129 https://aka.ms/ZTData
130 https://aka.ms/ZTCrossPillars
131 https://docs.microsoft.com/security/zero-trust/deploy/identity#i-cloud-identity-federates-with-on-premises-identity-systems
132 https://docs.microsoft.com/security/zero-trust/deploy/identity#ii-conditional-access-policies-gate-access-and-provide-remediation-
activities
133 https://docs.microsoft.com/security/zero-trust/deploy/identity#iii-analytics-improve-visibility
79
134 https://docs.microsoft.com/security/zero-trust/deploy/identity#iv-identities-and-access-privileges-are-managed-with-identity-governance
135 https://docs.microsoft.com/security/zero-trust/deploy/identity#v-user-device-location-and-behavior-is-analyzed-in-real-time-to-
determine-risk-and-deliver-ongoing-protection
136 https://docs.microsoft.com/security/zero-trust/deploy/identity#vi-integrate-threat-signals-from-other-security-solutions-to-improve-
detection-protection-and-response
80
Planning your Conditional Access policies in advance and having a set of active and fallback policies is a
foundational pillar of your Access
Policy enforcement in a Zero Trust deployment. Take the time to configure your trusted IP locations in
your environment. Even if they
are not used in a Conditional Access policy, configuring these IPs informs the risk of Identity Protection
mentioned above.
137 https://docs.microsoft.com/azure/active-directory/reports-monitoring/plan-monitoring-and-reporting
81
Foundational integrations
Foundational integrations protect your customers with Azure Active Directory's built-in security capabili-
ties.
138 https://www.microsoft.com/security/business/identity-access-management/integrated-apps-azure-ad
139 https://docs.microsoft.com/azure/active-directory/develop/publisher-verification-overview
83
140 https://docs.microsoft.com/azure/active-directory-b2c/microsoft-graph-operations
141 https://docs.microsoft.com/azure/active-directory-b2c/api-connectors-overview?pivots=b2c-user-flow
142 https://docs.microsoft.com/azure/active-directory-b2c/partner-gallery#identity-verification-and-proofing
143 https://docs.microsoft.com/azure/active-directory-b2c/partner-gallery#role-based-access-control
144 https://docs.microsoft.com/azure/active-directory-b2c/partner-gallery#role-based-access-control
145 https://docs.microsoft.com/azure/active-directory-b2c/partner-gallery#fraud-protection
84
Cloud authentication
When choosing this authentication method, Azure AD handles users'
sign-in process. Cloud authentication includes single sign-on (SSO), so that users can
sign into cloud apps without re-entering their credentials. With cloud
authentication, there are two options:
146 https://docs.microsoft.com/azure/active-directory-domain-services/tutorial-create-instance
85
Federated authentication
Azure AD hands off the authentication process to a separate trusted
authentication system when you choose this authentication method. An
example is on-premises Active Directory Federation Services (AD FS) to
validate the user's password.
The authentication system can provide additional advanced authentication
requirements. Examples are smartcard-based authentication or third-party
multifactor authentication. For more information, see Deploying Active Directory Federation Servic-
es148.
The following section helps determine which authentication method is
right using a decision tree. It helps determine whether to deploy a
cloud or federated authentication for an Azure AD hybrid identity
solution.
Architecture diagrams
The following diagrams outline the high-level architecture components
required for each authentication method that can be used with an Azure
AD hybrid identity solution.
The simplicity of a password hash synchronization solution:
147 https://docs.microsoft.com/azure/active-directory/hybrid/how-to-connect-pta
148 https://docs.microsoft.com/windows-server/identity/ad-fs/deployment/windows-server-2012-r2-ad-fs-deployment-guide
86
specific action might still be disallowed because the user or group did
not have the authorization to perform that action.
Administrators benefit from understanding the following authorization
methods to enforce Zero Trust. To learn more about these authorization
methods, see Get started with permissions, access, and security groups149.
Authorization Methods
●● Security group membership
●● Role-based access control
●● Access levels
●● Feature flags
●● Security namespaces & permissions
Requirements
Every company has different requirements and security policies. When you
create an architecture and follow this suggested framework for
Conditional Access, consider the company's requirements. The guidance
includes principles related to Zero Trust that can be used as input when
you create an architecture. Then, address specific company requirements
and policies and adjust the architecture accordingly.
For example, a company might have these requirements:
●● At least two factors must protect all access.
●● No data on unmanaged devices.
●● No guest access is allowed.
●● Access to cloud services must be based on password-less authentication.
149 https://docs.microsoft.com/azure/devops/organizations/security/about-permissions?view=azure-devops&preserve-view=true
150 https://docs.microsoft.com/azure/active-directory/conditional-access/overview
151 https://docs.microsoft.com/azure/architecture/guide/security/conditional-access-design
90
●● Conditional Access architecture and personas152 introduce the persona-based approach for
structuring Conditional Access policies. It also provides suggested personas to use as a starting point.
●● Conditional Access framework and policies153 provide specific details on how to structure and name
Conditional Access policies based on the personas.
152 https://docs.microsoft.com/azure/architecture/guide/security/conditional-access-architecture
153 https://docs.microsoft.com/azure/architecture/guide/security/conditional-access-framework
154 https://arch-center.azureedge.net/zero-trust-model.svg
91
The Zero Trust Conditional Access architecture is the one that best
fits the principles of Zero Trust. If the All cloud apps option in a
Conditional Access policy is selected, all endpoints are protected by
the provided grant controls, like known users and known or compliant
devices. But the policy doesn't just apply to the endpoints and apps
that support Conditional Access. It applies to any endpoint that the
user interacts with.
The challenge with this sign-in is that it doesn't support device-based
Conditional Access. This means that nobody can use the tools and
commands if you apply a baseline policy requiring known users and known
devices for all cloud apps. Other applications have the same problem
with device-based Conditional Access.
92
●● Internals - Internals contains all users who have an Active Directory account synced to Azure AD,
are employees of the company and work in a standard end-user role. We recommend that you add
internal users who are developers to the Developers persona.
●● Externals - This persona holds all external consultants who have an Active Directory account
synced to Azure AD. We recommend that you add external users who are developers to the Develop-
ers persona.
●● Guests - Guests hold all users who have an Azure AD guest account invited to the customer tenant.
●● GuestAdmins - The GuestAdmins persona holds all users who have an Azure AD guest account
assigned any of the previously mentioned admin roles.
●● Microsoft365ServiceAccounts - This persona contains cloud (Azure AD) user-based service
accounts used to access Microsoft 365 services when no other solution meets the need, like using a
managed service identity.
●● AzureServiceAccounts - This persona contains cloud (Azure AD) user-based service accounts that
are used to access Azure (IaaS/PaaS) services when no other solution meets the need, like using a
managed service identity.
●● CorpServiceAccounts - This persona contains user-based service accounts that have all of these
characteristics:
●● Originate from on-premises Active Directory. Originate from on-premises Active Directory
●● They are used from on-premises or an IaaS-based virtual machine in another (cloud) datacenter,
like Azure.
●● Are synced to an Azure AD instance that accesses any Azure or Microsoft 365 service. Note that
this scenario should be avoided.
●● WorkloadIdentities - This persona contains machine identities, like Azure AD service principals
and managed identities. Conditional Access now supports protecting access to resources from these
The template card for each persona provides input for creating the specific Conditional Access policies
for each persona.
155 https://docs.microsoft.com/azure/architecture/guide/security/conditional-access-framework
95
156 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure
157 https://docs.microsoft.com/azure/active-directory/roles/permissions-reference
158 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure
96
made an eligible member of an Azure AD role where they can then activate
the role for a limited time when needed. Privileged access is
automatically removed when the timeframe expires. You can
also configure PIM settings159 to
require approval or receive notification emails when someone activates
their role assignment. Notifications provide an alert when new users are
added to highly privileged roles.
159 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-how-to-change-default-settings
160 https://techcommunity.microsoft.com/t5/azure-active-directory-identity/your-pa-word-doesn-t-matter/ba-p/731984
161 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-how-to-change-default-settings
162 https://docs.microsoft.com/azure/active-directory/conditional-access/howto-conditional-access-policy-admin-mfa
163 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-create-azure-ad-roles-and-resource-roles-review
164 https://docs.microsoft.com/azure/active-directory/governance/create-access-review
97
165 https://docs.microsoft.com/azure/active-directory/roles/security-emergency-access
166 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/groups-features
167 https://docs.microsoft.com/azure/active-directory/roles/groups-concept
168 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/groups-features
98
169 https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/
170 https://portal.azure.com/#blade/Microsoft_AAD_ERM/DashboardBlade/
171 https://docs.microsoft.com/azure/active-directory/governance/create-access-review
172 https://docs.microsoft.com/azure/active-directory/governance/self-access-review
173 https://docs.microsoft.com/azure/active-directory/governance/complete-access-review
174 https://docs.microsoft.com/azure/active-directory/external-identities/what-is-b2b
175 https://docs.microsoft.com/azure/active-directory/external-identities/add-users-administrator
176 https://docs.microsoft.com/azure/active-directory/external-identities/what-is-b2b
100
You can then decide whether to ask each guest to review their own access or to ask one or more users to
review every guest's access.
Manage entitlement
With applications centrally authenticating and driven from Azure AD, you can now streamline your access
request, approval, and re-certification process to make sure that the right people have the right access
and
that you have a trail of why users in your organization have the access they have.
Follow these steps:
1. Use Entitlement Management to create access packages178 that users can request as they join
different teams/projects and that assign them access to the associated resources (such as applica-
tions, SharePoint sites, group memberships).
177 https://docs.microsoft.com/azure/active-directory/governance/manage-access-review#create-and-perform-an-access-review-for-users
178 https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-access-package-create
101
2. If deploying Entitlement Management isn't possible for your organization at this time, at least enable
self-service paradigms in your organization by deploying self-service group management179 and
self-service application
access180.
179 https://docs.microsoft.com/azure/active-directory/users-groups-roles/groups-self-service-management
180 https://docs.microsoft.com/azure/active-directory/manage-apps/manage-self-service-access
181 https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-delegate#entitlement-management-roles
182 https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-delegate#required-roles-to-add-resources-to-a-
catalog
183 https://www.microsoft.com/security/operations/security-intelligence-report
184 https://docs.microsoft.com/windows-server/identity/securing-privileged-access/securing-privileged-access
102
Develop a roadmap
Microsoft recommends that you develop and follow a roadmap to secure
privileged access against cyber attackers. You can always adjust your
roadmap to accommodate your existing capabilities and specific
requirements within your organization. Each stage of the roadmap should
raise the cost and difficulty for adversaries to attack privileged
access for your on-premises, cloud, and hybrid assets. Microsoft
recommends the following four roadmap stages. Schedule the most
effective and the quickest implementations first. This article can be
your guide based on Microsoft's experiences with cyber-attack incidents
and response implementation. The timelines for this roadmap are
approximations.
Stage 1 of the roadmap is focused on critical tasks that are fast and
easy to implement. We recommend that you do these few items right away
103
185 https://docs.microsoft.com/azure/active-directory/privileged-identity-management/pim-configure
105
186 https://docs.microsoft.com/azure/active-directory/roles/security-planning
187 https://www.microsoft.com/security/blog/2020/03/05/human-operated-ransomware-attacks-a-preventable-disaster/
106
188 https://docs.microsoft.com/security/compass/security-rapid-modernization-plan
189 https://en.wikipedia.org/wiki/Pass_the_hash
190 https://github.com/gentilkiwi/mimikatz
107
191 https://docs.microsoft.com/security/compass/privileged-access-success-criteria#clean-source-principle
108
4. Use separate accounts (On-premises AD accounts) to ensure administrative functions are isolated
from user account activities. All administrator accounts should have mail disabled, and no personal
Microsoft accounts should be allowed.
5. Deploy Microsoft Defender for Identity and review any open alerts. All open alerts should be
reviewed and mitigated by the appropriate teams.
2. Improve credential management experience
1. Implement and document self-service password reset and combined security information registra-
tion by enforcing self-service password reset (SSPR) in your organization.
2. Protect admin accounts by enforcing MFA / Passwordless for Azure AD privileged users. Require
Azure Active Directory Multi-Factor Authentication at sign-in for all individual users who are
permanently assigned to one or more of the Azure AD admin roles.
3. Block legacy authentication protocols for privileged user accounts. Leaving legacy authentication
protocols enabled can create an entry point for attackers.
4. Ensure the application consent process disables the end user's consent to Azure AD applications.
Enforcing the process establishes a centralized consent process to maintain centralized visibility
and control of the applications that have access to data.
5. Clean up accounts and sign-in risks by utilizing Azure AD Identity Protection and remediate any
discovered risks. Ensure to create a process that monitors and manages user and sign-in risk.
Exercise
Case Study: Design an identity security solution
Requirements
Tailwind Traders is planning on making some significant changes to their
Identity Security Strategy. They have asked for your assistance with
recommendations and questions. Here are the specific requirements.
Conditional Access. The company has a new security optimization project for customer environments.
The CISO wants to ensure that all available Privileged Users are controlled in the cloud.
Tasks
Question: Conditional Access - What could Tailwind Traders do to enforce Privileged Users to require
MFA for all cloud access?
1. Evaluate a solution and explain your decision-making process.
2. Create a Conditional Access Policy that enforces all Global Administrators to require MFA.
111
3. What could Tailwind Traders do to review administrators' access regularly to ensure only the right
people have continued access to Azure resources?
4. Configure recurring access reviews to revoke unneeded permissions over time.
Question: How are you enforcing Identity Security for all users to protect their data, applications, and
other assets in Microsoft Azure?
Summary
In this module, you've learned how to build an overall identity
security strategy with zero trust in mind. You have learned different
strategies for designing, defining, and recommending an organizational
security strategy and architecture. You should now be able to:
●● Secure access to cloud resources
●● Recommend an identity store for security
●● Recommend a secure authentication and authorization strategy
●● Secure conditional access
●● Design a strategy for role assignment and delegation
●● Define Identity governance for access reviews and entitlement
management
●● Design a security strategy for privileged role access to
infrastructure
●● Design a security strategy for privileged activities
192 https://docs.microsoft.com/security/zero-trust/deploy/identity
193 https://docs.microsoft.com/azure/architecture/guide/security/conditional-access-zero-trust
194 https://docs.microsoft.com/azure/active-directory/governance/entitlement-management-delegate
195 https://docs.microsoft.com/security/zero-trust/integrate/identity
196 https://docs.microsoft.com/azure/active-directory/roles/groups-concept
197 https://docs.microsoft.com/learn/modules/azure-active-directory/4-roles-azure-active-directory
198 https://docs.microsoft.com/learn/modules/hybrid-identity/3-authentication-options
199 https://docs.microsoft.com/learn/modules/azure-ad-privileged-identity-management/2-microsofts-zero-trust-model
112
Knowledge check
Check your knowledge
Multiple choice
Item 1. How can Tailwind Traders reference Microsoft Zero Trust Architecture?
Develop security requirements based on the organizational financial goals.
Identify the integration points for architecture using Microsoft Cybersecurity Reference Architecture
(MCRA).
Provide familiar security tools and significantly enhanced levels of network security.
Multiple choice
Item 2. How can Tailwind Traders enable IT Admins to integrate their current Windows Server Active
Directory solution located on-premises with Microsoft Azure Active Directory?
Design and implement a secure hybrid identity environment.
Use familiar Azure services and management capabilities, regardless of where they live.
Use Azure Policy to define common use cases by using built-ins available in the Azure environment.
Multiple choice
Item 3. How can Tailwind Traders enforce organizational standards and assess compliance at-scale?
Use Azure Policy to enable replication and to audit VM protection.
Give Conditional Access to resources based on device, identity, assurance, network location, and
more.
Use Azure Policy to implement governance for resource consistency.
Multiple choice
Item 4. What solution can Tailwind Traders use to evaluate security workflows in their Azure environment?
Azure Logic Apps could be used to evaluate and run automated workflows that integrate apps, data,
services, and systems.
Azure Arc could be used to evaluate and run automated workflows that integrate apps, data, services,
and systems.
Azure BluePrint could be used to evaluate and run automated workflows that integrate apps, data,
services, and systems.
113
Multiple choice
Item 5. How can Tailwind Traders evaluate and use Threat Intelligence to secure their Azure environment?
Using Microsoft Sentinel, you can evaluate threat indicators to help detect malicious activity observed
in an Azure environment and provide context to security investigators to help inform response
decisions.
Using standardized logs, you can monitor for threat indicators in an Azure environment.
Using Unified Operations, you can evaluate threat indicators in an Azure environment.
Multiple choice
Item 6. What are some Azure logs Tailwind Traders can monitor for a security incident?
You can use Activity Logs, Azure AD Reporting, and Network Security Group flow logs to monitor
security incidents.
You can monitor storage services for performance metrics.
You can monitor Azure Network watcher to monitor diagnostics conditions.
Multiple choice
Item 7. What can Tailwind Traders do to enforce strong authentication?
Roll out Azure AD MFA for all users and block legacy authentication using conditional access policies.
Use Azure AD MFA for only administrators.
Use Application Proxy to restrict access to applications.
Multiple choice
Item 8. How can Tailwind Traders reduce the risk of phishing and password attacks to secure their Azure
environment?
Enforce Azure AD to deploy FIDO 2.0 or password-less phone sign-in to reduce the risk of phishing
and password attacks.
Use ADFS to enforce authentication for legacy applications.
Enable Azure AD Hybrid Join to block access from clients.
Multiple choice
Item 9. What solution can Tailwind Traders use to monitor for user behavior inside SaaS and modern
applications?
Enable Microsoft Defender for Cloud Apps integration with Identity Protection.
Use Intune to monitor for abnormal behavior with applications.
Enforce Azure Active Directory B2C to implement secure white-label authentication.
114
Answers
Multiple choice
Item 1. How can Tailwind Traders reference Microsoft Zero Trust Architecture?
Develop security requirements based on the organizational financial goals.
■■ Identify the integration points for architecture using Microsoft Cybersecurity Reference Architecture
(MCRA).
Provide familiar security tools and significantly enhanced levels of network security.
Explanation
Identify the integration points for architecture using Microsoft Cybersecurity Reference Architecture (MCRA).
Multiple choice
Item 2. How can Tailwind Traders enable IT Admins to integrate their current Windows Server Active
Directory solution located on-premises with Microsoft Azure Active Directory?
■■ Design and implement a secure hybrid identity environment.
Use familiar Azure services and management capabilities, regardless of where they live.
Use Azure Policy to define common use cases by using built-ins available in the Azure environment.
Explanation
Design and implement a secure hybrid identity environment.
Multiple choice
Item 3. How can Tailwind Traders enforce organizational standards and assess compliance at-scale?
Use Azure Policy to enable replication and to audit VM protection.
Give Conditional Access to resources based on device, identity, assurance, network location, and
more.
■■ Use Azure Policy to implement governance for resource consistency.
Explanation
Use Azure Policy to implement governance for resource consistency.
Multiple choice
Item 4. What solution can Tailwind Traders use to evaluate security workflows in their Azure environment?
■■ Azure Logic Apps could be used to evaluate and run automated workflows that integrate apps, data,
services, and systems.
Azure Arc could be used to evaluate and run automated workflows that integrate apps, data, services,
and systems.
Azure BluePrint could be used to evaluate and run automated workflows that integrate apps, data,
services, and systems.
Explanation
Azure Logic Apps could be used to evaluate and run automated workflows that integrate apps, data,
services, and systems.
115
Multiple choice
Item 5. How can Tailwind Traders evaluate and use Threat Intelligence to secure their Azure environment?
■■ Using Microsoft Sentinel, you can evaluate threat indicators to help detect malicious activity observed
in an Azure environment and provide context to security investigators to help inform response
decisions.
Using standardized logs, you can monitor for threat indicators in an Azure environment.
Using Unified Operations, you can evaluate threat indicators in an Azure environment.
Explanation
Using Microsoft Sentinel, you can evaluate threat indicators to help detect malicious activity observed in an
Azure environment and provide context to security investigators to help inform response decisions.
Multiple choice
Item 6. What are some Azure logs Tailwind Traders can monitor for a security incident?
■■ You can use Activity Logs, Azure AD Reporting, and Network Security Group flow logs to monitor
security incidents.
You can monitor storage services for performance metrics.
You can monitor Azure Network watcher to monitor diagnostics conditions.
Explanation
You can use Activity Logs, Azure AD Reporting, and Network Security Group flow logs to monitor security
incidents.
Multiple choice
Item 7. What can Tailwind Traders do to enforce strong authentication?
■■ Roll out Azure AD MFA for all users and block legacy authentication using conditional access policies.
Use Azure AD MFA for only administrators.
Use Application Proxy to restrict access to applications.
Explanation
MFA has to be deployed for all users.
Multiple choice
Item 8. How can Tailwind Traders reduce the risk of phishing and password attacks to secure their Azure
environment?
■■ Enforce Azure AD to deploy FIDO 2.0 or password-less phone sign-in to reduce the risk of phishing
and password attacks.
Use ADFS to enforce authentication for legacy applications.
Enable Azure AD Hybrid Join to block access from clients.
Explanation
Reducing risk of phishing and password attacks isn't achieved by ADFS or Azure AD Hybrid Join.
116
Multiple choice
Item 9. What solution can Tailwind Traders use to monitor for user behavior inside SaaS and modern
applications?
■■ Enable Microsoft Defender for Cloud Apps integration with Identity Protection.
Use Intune to monitor for abnormal behavior with applications.
Enforce Azure Active Directory B2C to implement secure white-label authentication.
Explanation
Microsoft Defender for Cloud Apps with Identity Protection is the only of the three solutions that provides
user behavior monitoring.
Module 2 Evaluate Governance Risk Compli-
ance (GRC)strategies
Learning Objectives
In this module, you'll learn how to:
●● Interpret compliance requirements and their technical capabilities.
●● Evaluate infrastructure compliance by using Microsoft Defender for Cloud.
●● Interpret compliance scores and recommend actions to resolve issues or improve security.
●● Design and validate implementation of Azure Policy.
●● Design for data residency Requirements.
●● Translate privacy requirements into requirements for security solutions.
vary. The security requirements, however, can influence the design for data protection and retention,
network access, and system security.
Once the business risks are mapped and converted into decisions to policy statements, the cybersecurity
architect will be able to establish the regulatory compliance strategy. This strategy also takes into consid-
eration the industry in which the organization belongs or the type of transactions that the organization
performs. A good compliance strategy needs to ensure that security controls are implemented to directly
map regulatory compliance requirements, that's why is important to have full visibility of the type of
business, transactions, and overall business requirements before establishing a regulatory compliance
strategy.
Noncompliance can lead to fines or other business impact. Work with your regulators and carefully
review the standard to understand both the intent and the literal wording of each requirement. Here are
some questions that may help you understand each requirement.
●● How is compliance measured?
●● Who approves if the workload meets the requirements?
●● Are there processes for obtaining attestations?
●● What are the documentation requirements?
In traditional governance and incremental governance, corporate policy creates the working definition of
governance. Most IT governance actions seek to implement technology to monitor, enforce, operate, and
automate those corporate policies. Cloud governance is built on similar concepts.
After defining your corporate policy strategy, which includes regulatory compliance requirements, you'll
need to ensure that you have proper governance in place to stay compliant over time as new workloads
are provisioned. You can use the five disciplines of cloud governance shown in the diagram as the main
pillars for your cloud governance strategy.
Compliance considerations
Organizations may need to be compliant with one or more industry standards. Compliance is based on
various types of assurances, including formal certifications, attestations, validations, authorizations, and
assessments produced by independent third-party auditing firms, as well as contractual amendments,
self-assessments, and customer guidance documents.
Compliance can also be distinguished according to the type of risk, regulatory or operational. According
to Federal US regulators, Operational Risk is the failure to establish a system of internal controls and an
independent assurance function and exposes the organization to the risk of signification fraud, defalca-
tion, and other operational losses. While Compliance Risk is the risk of legal or regulatory sanctions,
financial loss, or damage to reputation resulting from failure to comply with laws, regulations, rules, other
regulatory requirements, or codes of conduct. When planning your compliance strategy, you should take
into consideration operational compliance that will support your regulatory compliance.
If your organization uses vendors or other trusted business partners, one of the biggest business risks to
consider may be a lack of adherence to regulatory compliance by these external organizations. This risk
often can't be remediated, and instead may require a strict adherence to requirements by all parties.
Make sure you've identified and understand any third-party compliance requirements before beginning a
policy review.
Improving operational compliance reduces the likelihood of an outage related to configuration drift or
vulnerabilities related to systems being improperly patched. The following table gives some examples of
operational compliance processes along with the tools that can perform them and their purpose.
tions. These policies may help you assess compliance with the control; however, there often isn't a
one-to-one or complete match between a control and one or more policies. As such, Compliant in Azure
Policy refers only to the policy definitions themselves; this doesn't ensure you're fully compliant with all
requirements of a control. In addition, the compliance standard includes controls that aren't addressed by
any Azure Policy definitions at this time. Therefore, compliance in Azure Policy is only a partial view of
your overall compliance status. The associations between compliance domains, controls, and Azure Policy
definitions for this compliance standard may change over time.
By default, every subscription has the Azure Security Benchmark assigned. This is the Microsoft-authored,
Azure-specific guidelines for security and compliance best practices based on common compliance
frameworks. Learn more about Azure Security Benchmark. Available regulatory standards:
●● PCI-DSS v3.2.1:2018
●● SOC TSP
●● NIST SP 800-53 R4
●● NIST SP 800 171 R2
●● UK OFFICIAL and UK NHS
●● Canada Federal PBMM
●● Azure CIS 1.1.0
●● HIPAA/HITRUST
●● SWIFT CSP CSCF v2020
●● ISO 27001:2013
●● New Zealand ISM Restricted
●● CMMC Level 3
●● Azure CIS 1.3.0
●● NIST SP 800-53 R5
●● FedRAMP H
●● FedRAMP M
Many security features, like security policy and recommendations, are available for free. Some of the
more advanced features, like just-in-time VM access and hybrid workload support, are available under
the Defender for Cloud Standard tier. Just-in-time VM access can help reduce the network attack surface
by controlling access to management ports on Azure VMs.
The regulatory compliance dashboard in Microsoft Defender for Cloud shows your selected compliance
standards with all their requirements, where supported requirements are mapped to applicable security
assessments. The status of these assessments reflects your compliance with the standard. Below you have
an example of the Regulatory Compliance Dashboard in Microsoft Defender for Cloud:
The regulatory compliance dashboard shows the status of all the assessments within your environment
for your chosen standards and regulations. As you act on the recommendations and reduce risk factors in
your environment, your compliance posture improves.
Using the information in the regulatory compliance dashboard, you can improve your compliance
posture by resolving recommendations directly within the dashboard. You can select any of the failing
assessments that appear in the dashboard to view the details for that recommendation. Each recommen-
dation includes a set of remediation steps to resolve the issue. From there you can select any of the
failing assessments that appear in the dashboard to view the details for that recommendation. Each
recommendation includes a set of remediation steps to resolve the issue.
Use the regulatory compliance dashboard to help focus your attention on the gaps in compliance with
your chosen standards and regulations.
Let's consider a scenario where Contoso Security Admin needs to ensure their SQL Databases workloads
are compliant with PCI DSS 3.2.1. When reviewing the dashboard, he noticed the following item was not
compliant:
To address this issue, the Security Admin needs to click on the SQL servers should have an Azure Active
Directory administrator provisioned recommendation and remediate it.
To track your progress over time you can use the Compliance Over Time Workbook. This workbook tracks
your compliance status over time with the various standards you've added to your dashboard.
123
Set Guardrails
Azure Policy can also help to set guardrails throughout your resources to help ensure cloud compliance,
avoid misconfigurations, and practice consistent resource governance. Consider also using Azure Policy
to reduce the number of external approval processes by implementing policies at the core of the Azure
platform for increased developer productivity and control optimization of your cloud spend. Azure Policy
will help you govern your Azure resources with simplicity, enforce policies and audit compliance, and
monitor compliance continuously. Azure Policy establishes conventions for resources. Policy definitions
describe resource compliance conditions and the effect to take if a condition is met. A condition com-
pares a resource property field or a value to a required value. Resource property fields are accessed by
using aliases. When a resource property field is an array, a special array alias can be used to select values
from all array members and apply a condition to each one. The diagram below shows an example of how
Azure Policy can be used in the beginning of the pipeline to ensure that policies are enforced upon the
creation of the resources.
Control Costs
By defining conventions, you can control costs and more easily manage your resources. For example, you
can specify that only certain types of virtual machines are allowed. Or, you can require that resources
have a particular tag. Policy assignments are inherited by child resources. If a policy assignment is applied
to a resource group, it's applicable to all the resources in that resource group.
In the event the policy definition is changed at this stage of testing, it's recommended to begin the
validation process over with the auditing of existing resources. A change to the policy definition for a
false positive on new or updated resources is likely to also have an impact on existing resources.
Data Sovereignty
When designing your data residency solution, one common requirement is regarding data sovereignty.
While it implies data residency; it also introduces rules and requirements that define who has control over
and access the data stored in the cloud. In many cases, data sovereignty mandates that customer data be
subject to the laws and legal jurisdiction of the country or region in which data resides. These laws can
have direct implications on data access even for platform maintenance or customer-initiated support
requests. You can use Azure public multi-tenant cloud in combination with Azure Stack products for
on-premises and edge solutions to meet your data sovereignty requirements, as described later in this
article. These other products can be deployed to put you solely in control of your data, including storage,
processing, transmission, and remote access.
Personal Data
As a customer, you retain all rights, titles, and interest in and to customer data—personal data and other
content—that you provide for storing and hosting in Azure services. Microsoft will not store or process
customer data outside the geography you specify, except for certain services and scenarios. You are also
in control of any additional geographies where you decide to deploy your solutions or replicate your
data. In addition, you and your users may move, copy, or access your customer data from any location
globally. Most Azure services are deployed regionally and enable you to specify where your customer
data will be stored and processed. Examples of such regional services include VMs, storage, and SQL
Database. To maintain resiliency, Microsoft uses variable network paths that sometimes cross geo
boundaries; however, replication of customer data between regions is always transmitted over encrypted
network connections.
If you want to ensure your data is stored only in your chosen Geography, you should select from the
options below:
●● Data storage for regional services: Most Azure services are deployed regionally and enable you to
specify the region into which the service will be deployed. Microsoft won't store your data outside the
Geography you specified except for a few regional services and Preview services as described on the
Azure data location page. This commitment helps ensure that your data stored in a given region will
remain in the corresponding Geography, and won't be moved to another Geography for most
regional services. For service availability, see Products available by region.
●● Data storage for non-regional services: Certain Azure services don't enable you to specify the region
where the services will be deployed as described on the data location page. For a complete list of
non-regional services, see Products available by region.
Your data in an Azure Storage account is always replicated to help ensure durability and high availability.
Azure Storage copies your data to protect it from transient hardware failures, network or power outages,
and even massive natural disasters. You can typically choose to replicate your data within the same data
center, across availability zones within the same region, or across geographically separated regions.
One example of a non-regional service is Azure Active Directory (Azure AD). In other words, Azure AD
may store identity data globally, except for Azure AD deployments in:
●● The United States, where identity data is stored solely in the United States.
●● Europe, where Azure AD keeps most of the identity data within European datacenters except as noted
in Identity data storage for European customers in Azure Active Directory.
●● Australia and New Zealand, where identity data is stored in Australia except as noted in Customer
data storage for Australian and New Zealand customers in Azure Active Directory.
Customers can configure certain Azure services, tiers, or plans to store customer data only in a single
region, with certain exceptions. These include Azure Backup, Azure Data Factory, Azure Site Recovery,
Azure Stream Analytics, and locally redundant storage (LRS).
Azure storage
All Azure Storage services (Blob storage, Queue storage, Table storage, and Azure Files) support serv-
er-side encryption at rest; some services additionally support customer-managed keys and client-side
encryption.
Data classification
The security controls that will be applied to the data will vary also according to the level of privacy
required by the data and to ensure that you're prioritizing the data that it is important to be secure you'll
need to classify your data. Data classification is a way of categorizing data assets by assigning unique
logical labels or classes to the data assets. Classification is based on the business context of the data. For
example, you might classify assets by Passport Number, Driver's License Number, Credit Card Number,
SWIFT Code, Person's Name, and so on.
One solution for data classification in Azure is Microsoft Purview. Microsoft Purview is a unified data
governance service that helps you manage and govern your on-premises, multi-cloud, and Software as a
Service (SaaS) data. Create a holistic, up-to-date map of your data landscape with automated data
discovery, sensitive data classification, and end-to-end data lineage. Enable data curators to manage and
secure your data estate. Empower data consumers to find valuable, trustworthy data. Microsoft Purview
provides a common platform for data producers and consumers to access common data management
functions like a data catalog, data insights, and a data map. This common platform integrates with
on-premises, the cloud as well as software-as-a-service applications. It also integrates with cloud data
services such as Azure Synapse Analytics, SQL Server, Power BI, Azure SQL and Microsoft 365.
131
Identity Protection
One important aspect of privacy is to ensure that you have a system to protect the user's identity. A
compromised identity could lead to data compromise and directly affect the privacy requirements for
your project. Consider using Azure AD Identity Protection to enhance your identity protection strategy to
ensure you're fulfilling the privacy requirements.
Identity Protection uses the learnings Microsoft has acquired from their position in organizations with
Azure AD, the consumer space with Microsoft Accounts, and in gaming with Xbox to protect your users.
Microsoft analyzes 6.5 trillion signals per day to identify and protect customers from threats. The signals
generated by and fed to Identity Protection, can be further fed into tools like Conditional Access to make
access decisions, or fed back to a security information and event management (SIEM) tool for further
investigation based on your organization's enforced policies.
Exercise
Contoso Pharma is an international pharmaceutical industry with a presence in North America and
Europe. Contoso Pharma has workloads on-premises and in Azure. The goal is that in the next two years,
all workloads will be fully in Azure and there will be minimum workloads on-premises. Below is a list of
their major workloads:
●● VMs (Windows and Linux)
●● Storage accounts
●● Key Vault
●● SQL PaaS and SQL on VMs
Contoso Pharma also has a Site-to-Site VPN between the headquarters in Redmond and the main office
in London. This VPN is used to allow resources on-premises to communicate.
Contoso Pharma has a legacy environment in Redmond composed by a couple of Windows Server 2012
running a Web Server that is used by the application that queries the database to check for customer's
information. Upon investigation it was noted that the communication of the legacy web server with the
database is done via HTTP.
132
Design Requirements
Contoso Pharma has different compliance needs according to their workloads, as shown in the table
below:
Questions
●● To ensure that Contoso Pharma can analyze their compliance status over time, which tool should be
utilized? Select the most appropriate option.
●● Which service in Azure should be used to enforce workload owners to create only resources that are
following the required standards?
●● Which option should be utilized to ensure that when workload owners create resources, they're
keeping the data in the correct geo-location?
●● How can Contoso Pharma validate if the VMs that were provisioned are compliant with PCI DSS and if
they're not what needs to be done to remediate?
●● Data encryption is an imperative component to address your privacy requirements. What are the data
stages that you must apply encryption?
●● Which Azure service can you use to enforce data encryption across workloads?
Summary
In this module you learned that business risk is the starting point to
establishing a compliance strategy, since it is during the business's
risk assessment that you'll identify the regulatory compliance needs
based on the industry's requirements. You learned that operational
compliance should be in place to support the regulatory compliance needs
and the options available in Azure to help you be compliant with the
major regulatory standards. You also learned how to interpret compliance
scores using Microsoft Defender for cloud and how to recommend actions
to improve your compliance over time.
In addition, you learned how to design and validate your Azure Policy to
enforce compliance requirements and continuously monitor your
environment. As part of the compliance strategy, you also learned to
design data residency requirements and translate privacy requirements
133
More information
Visit the links below for more information about the topics covered in
this module:
●● Define cloud governance corporate policy - Cloud Adoption Framework1
●● Operational compliance in Azure - Cloud Adoption Framework2
●● Azure and other Microsoft cloud services compliance offerings -
Azure Compliance3
●● Operational compliance in Azure - Cloud Adoption Framework4
●● Evaluate and define corporate policy - Cloud Adoption Framework5
●● Regulatory compliance - Microsoft Azure Well-Architected Framework6
●● HIPAA HITRUST 9.27
●● Visit Azure Compliance offerings to learn more about the industries
that are covered by Azure from the compliance perspective: Azure and other Microsoft cloud
services compliance offerings - Azure Compliance8
●● Watch this webinar9 for more
information on how to track your regulatory compliance. Although this
webinar was delivered when Microsoft Defender for Cloud was called Azure
Security Center, the content and rationale are still applicable for this
topic.
●● Watch this video10 more information
on how to use the Compliance Over Time Workbook workbook. Although this
video was recorded when Microsoft Defender for Cloud was called Azure
Security Center, the content and rationale are still applicable for this
topic.
●● Watch this video11 for a quick demo
on Allowed Locations policy
●● For more information, visit Data Residency in
Azure12
1 https://docs.microsoft.com/azure/cloud-adoption-framework/govern/policy-compliance/policy-definition
2 https://docs.microsoft.com/azure/cloud-adoption-framework/manage/azure-management-guide/operational-compliance?tabs=UpdateM
anagement%2CAzurePolicy%2CAzureBlueprints
3 https://docs.microsoft.com/azure/compliance/offerings/
4 https://docs.microsoft.com/azure/cloud-adoption-framework/manage/azure-management-guide/operational-compliance?tabs=UpdateM
anagement%2CAzurePolicy%2CAzureBlueprints
5 https://docs.microsoft.com/azure/cloud-adoption-framework/govern/corporate-policy
6 https://docs.microsoft.com/azure/architecture/framework/security/design-regulatory-compliance
7 https://docs.microsoft.com/azure/governance/policy/samples/hipaa-hitrust-9-2
8 https://docs.microsoft.com/azure/compliance/offerings/
9 https://youtu.be/tD8JnqzNOPc
10 https://youtu.be/S_zJ2QBkk-0
11 https://youtu.be/n469bC2V2Wo
12 https://azure.microsoft.com/global-infrastructure/data-residency/
134
13 https://youtu.be/W2bsj3ULw0Y
14 https://youtu.be/1REQYdZ6364
135
Learning Objectives
In this module, you'll learn how to:
●● Evaluate security postures by using benchmarks
●● Evaluate security postures by using Microsoft Defender for Cloud
●● Evaluate security postures by using Secure Scores
●● Evaluate security hygiene of Cloud Workloads
●● Design security for an Azure Landing Zone
●● Interpret technical threat intelligence and recommend risk mitigations
●● Recommend security capabilities or controls to mitigate identified risks
Continuous improvement of asset security posture means that governance teams should focus on
improving standards, and enforcement of those standards, to keep up with the cloud and attackers.
136
Information technology (IT) organizations must react quickly to new threats and adapt accordingly.
Attackers are continuously evolving their techniques, and defenses are continuously improving and might
need to be enabled. You can't always get all the security you need into the initial configuration.
This Rapid Modernization Plan (RaMP) shown in the diagram below will enable you to quickly improve
your security posture with the least number of challenges.
The posture management function will need to grow and continuously improve to tackle the full set of
technical debt that the organization has accrued from over 30+ years of security being a low priority.
Posture management will need to secure all the technologies and teams in the organization plus meet
the needs of the organization as it changes (new platforms are adopted, new security tools become
available to monitor and reduce risk, etc.). Any expansions in scope will take preparation to build leader-
ship support, relationships across technical teams, posture management team skillsets, and processes.
Security posture refers to the current state of an organization's security—that is, its overall state of
protection to its identities, endpoints, user data, apps and infrastructure.. The diagram below shows the
three major pillars of security posture management.
137
15 https://attack.mitre.org/
140
When you use Secure Score as your Key Performance Indicators (KPI), you
can track progress as you continuously remediate security
recommendations to drive your secure score up.
While driving security posture enhancement by remediating security
recommendations triggered by Microsoft Defender for Cloud and using
Secure Score to track your progress is the recommended choice, more can
be done to keep positively progressing towards a better security
posture. When a company doesn't have a very mature Azure Governance,
chances are that they will experience a fluctuation in the secure score
(ups and downs), and this can happen if you continue provisioning new
resources that are not secure by default.
Having a solid Azure Governance enables you to ensure that new resources
that are deployed, are going to have certain standards, patterns, and
configurations. To ensure proper governance you can use Azure
Policy and Azure Blueprints. This will allow you to enforce policies and
reject deployment of resources that are not following certain standards.
Defender for Cloud can help the governance of those workloads by
using Azure Policy to enforce secure configuration, based on a
specific recommendation. Some recommendations will be based on policies
that can use the Deny effect, which in this case can stop unhealthy
resources from being created. Some other recommendations are based on
the DeployIfNotExist effect, which can automatically remediate
non-compliant resources upon creation. Below you have an example of a
recommendation that has the Enforce button, which behind the scene is
implementing the DeployIfNotExist effect.
143
●● Investigate attacks
●● Work with cloud workload Owner to apply remediation
In many scenarios the IT Security Admin does not have the right level of
privileges in the workload to expedite the remediation of
recommendations. When a user doesn't have the right level of privilege
in the workload and tries to remediate a recommendation by using the
Fix button, they will have the experience shown in the image below,
where the Fix button is grey out.
145
16 https://docs.microsoft.com/azure/defender-for-cloud/workflow-automation
146
The tools and processes you implement for managing environments play an
important role in detecting and responding to issues. These tools work
alongside the controls that help maintain and demonstrate compliance. As
the organization's cloud environment develops, these compliance design
areas will be the focus for iterative refinement. This refinement might
be because of new applications that introduce specific new requirements,
or the business requirements changing. For example, in response to a new
compliance standard.
●● Data retention periods for audit data. Azure Active Directory (Azure AD) Premium reports have a
30-day retention period.
●● Long-term archiving of logs like Azure activity logs, virtual machine (VM) logs, and platform as a
service (PaaS) logs.
●● Security controls:
●● Where are the handoffs for team responsibilities? These responsibilities need consideration when
monitoring or responding to security events.
●● Consider the guidance in the Secure methodology for security operations.
150
Microsoft Sentinel can help detect, respond to, and provide CTI context for malicious cyber activity. You
can also use Microsoft Sentinel to:
●● Import threat indicators from Structured Threat Information Expression (STIX) and Trusted Automated
Exchange of Intelligence Information (TAXII) servers, or from any threat intelligence platform (TIP)
solution
●● View and query threat indicator data
●● Create analytics rules to generate security alerts, incidents, and automated responses from CTI data
●● Visualize key CTI information in workbooks
Another product that also uses threat intelligence is Microsoft
Defender for Cloud. Defender for Cloud's threat protection works by
monitoring security information from your Azure resources, the network,
and connected partner solutions. It analyzes this information, often
correlating information from multiple sources, to identify threats. When
Defender for Cloud identifies a threat, it triggers a security alert,
which contains detailed information regarding the event, including
suggestions for remediation. To help incident response teams investigate
and remediate threats, Defender for Cloud provides threat intelligence
153
●● Activity Group Report: provides deep dives into attackers, their objectives, and tactics.
●● Campaign Report: focuses on details of specific attack campaigns.
●● Threat Summary Report: covers all of the items in the previous two reports.
This type of information is useful during the incident response process,
where there's an ongoing investigation to understand the source of the
attack, the attacker's motivations, and what to do to mitigate this
issue in the future.
Threat intelligence is also used in other Microsoft Security
solutions, such as Azure AD Identity Protection, which has a featured
called Risk Detection. Risk detections (both user and sign-in linked)
contribute to the overall user risk score that is found in the Risky
Users report. These risks are calculated offline using Microsoft's
internal and external threat intelligence sources including security
researchers, law enforcement professionals, security teams at Microsoft,
and other trusted sources. The image below has an example of the risk
detection capability in Azure AD Identity Protection:
154
Risk mitigations
Thinking of risks in this manner is sometimes referred to as the
event-driven risk model. This term implies that a list of risks is a
list of potential future events. Each risk describes some event that
could occur in the future. The risk might include some information about
the probability of occurrence. It should include a description of the
impact that such an occurrence would have on the project plan. It may
also include a description of ways to reduce the probability of
occurrence and ways to mitigate the impact of occurrence.
Risk management activities fall into four phases: identification,
assessment, response, and monitoring and reporting. In the list below
you have more details about each phase:
●● Identification: The risk management process starts with identifying
all possible risks to all key control areas, internal and external
threats, and vulnerabilities in the environment. The identification
phase is also when decision logs, active security and compliance
exceptions, and mitigation work from previous risk assessments are
reviewed
155
Let's use as an example a scenario where you're the Cybersecurity Architect that is recommending
security capabilities and controls to mitigate the identified risks.
●● During the Identification of the risks, you found a production subscription that has ten Azure Storage
accounts
that are widely open to the Internet.
●● During the Assessment phase, you determined that five of these storage accounts have low impact in
case of compromise. The low impact was because they do not contain important information. Howev-
er, you found five other storage accounts that could have a high impact in case of compromise.
●● The Response for the first five is to tolerate the risk while the other five will need to be improved by
adding technical controls to mitigate the risk.
In this case technical controls include:
●● Require secure transfer (HTTPS) to the storage account
●● Lock storage account to prevent accidental or malicious deletion or
configuration changes
●● Use Azure Active Directory (Azure AD) to authorize access to blob
data
●● Disable anonymous public read access to containers and blobs
●● Configure the minimum required version of Transport Layer Security
(TLS) for a storage account.
●● Enable firewall rules
●● Enable Defender for Storage
As part of the Monitoring and Reporting phase, ensure that the storage account has diagnostic logging
enabled. Also ensure that Microsoft Defender for Cloud is enabled on the subscription level for continu-
ous assessment of storage accounts as well as security recommendations.
Risk mitigations should be evaluated case-by-case based on those
parameters mentioned above, which also includes the type of threat. If
during the Identification it was established that there's a high
probably that Windows VMs with management port open could be compromised
157
by RDP Brute Force Attack, then you need to mitigate this risk, and one
technical control that can reduce the attack vector is Defender for
Servers feature called Just-in-Time VM access.
Defender for Cloud provides a list of security controls organized in a
top-down approach that can help you to use a priority list to address
security recommendations. As you remediate all security recommendations
that belong to a security control, you'll see an increase in your
overall security score, which means you're improving your security
posture. The example below shows the Secure management ports security
control expanded with three recommendations that needs to be addressed.
Once all three are remediated, you'll receive eight points in your
secure score, as shown in the Max score column. There are also security
controls that will suggest the implementation of a security capability,
for example the security control Protect applications against DDoS
attacks shown below, suggests the enablement of WAF to mitigate this
risk.
You can also use Azure Security Benchmark to identify the resources
that are in risk enable security capabilities to mitigate these risks
based on the remediation steps suggested by the benchmark, as shown in
the example below:
158
Notice that in this scenario, you have a security control called DP-3
Encrypt sensitive data in transit, and within this control, you have a
series of security recommendations for different workloads (storage
account, web applications, VMs and servers). The advantage of this
approach is that you're mitigating a specific scenario, which is the
encryption of sensitive data in transit, and you're looking at this
scenario across different workloads.
As a cybersecurity architect, you need to select the appropriate security capability for a given risk. For
certain scenarios that may mean the addition of a new service.
Let's use as an example of a scenario where a company needs to
provide customized remote access to employees based on a series of
conditions, including limiting access upon an abnormal behavior.
Although most users have a normal behavior that can be tracked, when
they fall outside of this norm it could be risky to allow them to just
sign in.
In scenarios like this, you may want to block that user or maybe
just ask them to perform multifactor authentication to prove that they
really are who they say they are. To address this risk, you can use
Azure AD Conditional Access and use the Sign-in risk-based Conditional Access policy.
There are also the scenarios that you'll need to select the
appropriate security control for a given risk and in this case the
security control may be just hardening the current resource. An example
could be to reduce the risk on of an attacker compromise a database by
hardening the database and enabling security controls such as
Transparent Data Encryption (TDE). This enables you to encrypt data at
rest without changing existing applications.
159
Exercise
Scenario
Questions
1. Evaluate security posture
●● In this scenario, should the company track progress using Azure Security Benchmark or Secure
Score? Justify your answer.
●● What tool should the CISO adopt to track progress overtime?
2. Threat intelligence
●● Which tool should be utilized to aggregate CTI feeds and present in a meaningful dashboard?
●● Which tool provides built-in threat intelligence report that can be used to improve the companies'
defenses?
3. Which security capability will enable Tailwind Traders to implement the CIO's vision of empowering
the remote users while enforcing security and restrictions based on the user's geo-location?
a. Defender for Cloud
b. Microsoft Sentinel
c. Azure AD Identity Protection
d. Azure WAF
Answer: C
4. Which cloud security capability should be used to enable the AI/Robotics Team test their apps without
disrupting the production environment?
a. SDL
b. Azure Landing Zone
c. Azure Policy
d. On-premises sandbox
Answer: B
161
Summary
In this module you learned how to evaluate your organization's security
posture by using different benchmarks, including Azure Security
Benchmark. You learned how to use Microsoft Defender for Cloud as a
cloud security posture management platform and improved your security
hygiene. You also learned to use Secure Score to drive security posture
enhancements and track progress overtime. As part of this continuous
improvement process, you also learned how to evaluate the security
hygiene of cloud workloads and how to design security for Azure Landing
Zone.
In addition, you learned how to interpret threat intelligence and used
this insight to recommend mitigations when appropriated. Lastly, you
learned how to recommend security capabilities or controls to mitigate
the risks that were identified.
Visit the links below for more information about the topics covered in
this module:
●● Microsoft uses threat intelligence to protect, detect, and respond to threats17
●● What is risk? Azure AD Identity Protection18
●● Sign-in risk-based Conditional Access - Azure Active Directory19
●● Cyber threat intelligence in Microsoft Sentinel - Azure Example Scenarios20
●● Tracking your secure score in Microsoft Defender for Cloud21
●● Security recommendations in Microsoft Defender for Cloud22
●● Microsoft Defender for Cloud threat intelligence report23
17 https://www.microsoft.com/en-us/insidetrack/microsoft-uses-threat-intelligence-to-protect-detect-and-respond-to-threats
18 https://docs.microsoft.com/en-us/azure/active-directory/identity-protection/concept-identity-protection-risks
19 https://docs.microsoft.com/en-us/azure/active-directory/conditional-access/howto-conditional-access-policy-risk
20 https://docs.microsoft.com/en-us/azure/architecture/example-scenario/data/sentinel-threat-intelligence
21 https://docs.microsoft.com/en-us/azure/defender-for-cloud/secure-score-access-and-track
22 https://docs.microsoft.com/en-us/azure/defender-for-cloud/review-security-recommendations
23 https://docs.microsoft.com/en-us/azure/defender-for-cloud/threat-intelligence-reports
162
Knowledge check
Check your knowledge
Multiple choice
Item 1. Which tool should you use to automate compliance for core Azure Services and set a standard in the
environment's settings?
Azure Automation Update Management
Azure Policy
Azure Blueprints
Multiple choice
Item 2. Which solution should you utilize if the requirements for your project include cloud security posture
management from a centralized location?
Microsoft Defender for Cloud
Azure Purview
Azure AD
Multiple choice
Item 3. Which steps below are not part of the recommended approach to validate a new Azure Policy that
was customized for your organization's compliance requirements?
Audit new or updated resource requests
Deploy your policy to resources
Duplicate your Azure Policy
Multiple choice
Item 4. When you design your data residency strategy, which tool should you use to ensure you're con-
trolling which regions different resource types can be deployed to?
Azure Policy
Azure AD
Azure Identity Protection
Multiple choice
Item 5. To which scenario is the use of SSL/TLS protocols to exchange data across different locations rele-
vant?
Data at-rest in the datacenter
Data in-transit
Data at-rest in the user's device
163
Multiple choice
Item 6. When evaluating your organization's security posture, which pillar represents proactive measures
that need to be done to enhance the security hygiene of your workloads?
Detect
Protect
Respond
Multiple choice
Item 7. Which capability in Defender for Cloud can be used to expedite notifications to workload owners
when new security recommendations are available?
Workflow Automation
Secure Score
Playbook
Multiple choice
Item 8. Risk detection is a capability that belongs to which product?
Defender for Cloud
Microsoft Sentinel
Azure ID Identity Protection
164
Answers
Multiple choice
Item 1. Which tool should you use to automate compliance for core Azure Services and set a standard in
the environment's settings?
Azure Automation Update Management
Azure Policy
■■ Azure Blueprints
Explanation
Azure Blueprints can be used to automate compliance for Azure Services.
Multiple choice
Item 2. Which solution should you utilize if the requirements for your project include cloud security
posture management from a centralized location?
■■ Microsoft Defender for Cloud
Azure Purview
Azure AD
Explanation
Security posture management from a centralized location is one of the main capabilities in Defender for
Cloud.
Multiple choice
Item 3. Which steps below are not part of the recommended approach to validate a new Azure Policy that
was customized for your organization's compliance requirements?
Audit new or updated resource requests
Deploy your policy to resources
■■ Duplicate your Azure Policy
Explanation
The duplication of Azure Policy is not part of the validation process.
Multiple choice
Item 4. When you design your data residency strategy, which tool should you use to ensure you're
controlling which regions different resource types can be deployed to?
■■ Azure Policy
Azure AD
Azure Identity Protection
Explanation
Azure Policy has features that enable admins to enforce the deployment per region.
165
Multiple choice
Item 5. To which scenario is the use of SSL/TLS protocols to exchange data across different locations
relevant?
Data at-rest in the datacenter
■■ Data in-transit
Data at-rest in the user's device
Explanation
SSL/TLS are relevant for data-in-transit.
Multiple choice
Item 6. When evaluating your organization's security posture, which pillar represents proactive measures
that need to be done to enhance the security hygiene of your workloads?
Detect
■■ Protect
Respond
Explanation
Protect is the only pillar that includes proactive measures. Detect and Respond are both reactive.
Multiple choice
Item 7. Which capability in Defender for Cloud can be used to expedite notifications to workload owners
when new security recommendations are available?
■■ Workflow Automation
Secure Score
Playbook
Explanation
Workflow Automation is the best choice for automating notifications.
Multiple choice
Item 8. Risk detection is a capability that belongs to which product?
Defender for Cloud
Microsoft Sentinel
■■ Azure ID Identity Protection
Explanation
Azure AD Identity Protection is the only one of the three choices that includes Risk detection.
Module 3 Design security for infrastructure
Learning Objectives
In this module, you'll learn how to:
●● Plan and implement a security strategy across teams
●● Establish a strategy and process for proactive and continuous evaluation of security strategy
While these could be part of any security modernization plan, the rapid
pace of change in the cloud makes adopting them an urgent priority.
●● Partnership with shared goals. In this age of fast paced decisions
and constant process evolution, security can no longer adopt an
“arms-length” approach to approving or denying changes to the
environment. Security teams must partner closely with business and
IT teams to establish shared goals around productivity, reliability,
and security and work collectively with those partners to achieve
them.
●● This partnership is the ultimate form of “shift left”—the
principle of integrating security earlier in the processes to make
fixing security issues easier and more effective. This requires a
culture change by all involved (security, business, and IT),
requiring each to learn the culture and norms of other groups while
simultaneously teaching others about their own. Security teams must:
●● Learn the business and IT objectives and why each is important
and how they're thinking about achieving them as they
transform.
●● Share why security is important in the context of those business
goals and risks, what other teams can do to meet security goals,
and how they should do it.
●● Security is an ongoing risk, not a problem. You can't “solve”
crime. At its core, security is just a risk management discipline,
which happens to be focused on malicious actions by humans rather
than natural events. Like all risks, security isn't a problem that
can be fixed by a solution, it's a combination of the likelihood
and impact of damage from a negative event, an attack. It's most
comparable to traditional corporate espionage and criminal
activities where organizations face motivated human attackers who
have financial incentive to successfully attack the organization.
●● Success in either productivity or security requires both. An
organization must focus on both security and productivity in
today's “innovation or become irrelevant” environment. If the
organization isn't productive and driving new innovation, it could
lose competitiveness in the marketplace that causes it to weaken
financially or eventually fail. If the organization isn't secure
and loses control of assets to attackers, it could lose
competitiveness in the marketplace that causes it to weaken
financially and eventually fail.
●● No organization is perfect at adopting the cloud, not even
Microsoft. Microsoft's IT and security teams grapple with many of
the same challenges that our customers do such as figuring out how
to structure programs well, balancing supporting legacy software
with supporting cutting-edge innovation, and even technology gaps in
cloud services. As these teams learn how to better operate and
secure the cloud, they're actively sharing their lessons learned
via documents like this along with others on the IT showcase site,
169
Deliverables
The strategy step should result in a document that can easily be communicated to many stakeholders
within the organization. The stakeholders can potentially include executives on the organization's
leadership team.
We recommended capturing the strategy in a presentation to facilitate
easy discussion and updating. This presentation can be supported with a
document, depending on the culture and preferences.
●● Strategy presentation: You might have a single strategy presentation, or you might choose to also
create summary versions for leadership audiences.
●● Full presentation: This should include the full set of elements for the security strategy in the main
presentation or in optional reference slides.
●● Executive summaries: Versions to use with senior executives and board members might contain
only critical elements relevant to their role, such as risk appetite, top priorities, or accepted risks.
●● You can also record motivations, outcomes, and business justifications in the strategy and plan
template1.
1 https://raw.githubusercontent.com/microsoft/CloudAdoptionFramework/master/plan/cloud-adoption-framework-strategy-and-plan-
template.docx
174
●● Use an agile approach to immediately establish minimum security requirements and continuously
improve security assurances over time.
●● Encourage security culture change through intentional proactive leadership actions.
●● Modernize security strategy: The security strategy should include considerations for all aspects of
modern technology environment, current threat landscape, and security community resources.
●● Adapt to the shared responsibility model of the cloud.
●● Include all cloud types and multi-cloud deployments.
●● Prefer native cloud controls to avoid unnecessary and harmful friction.
●● Integrate the security community to keep up with the pace of attacker evolution.
Strategy approval
Executives and business leaders with accountability for outcomes or
risks of business lines within the organization should approve this
strategy. This group might include the board of directors, depending on
the organization.
Deliverables:
●● Security plan: A security plan should be part of the main planning documentation for the cloud. It
might be a document that uses the strategy and plan template2, a detailed slide deck, or a project
2 https://raw.githubusercontent.com/microsoft/CloudAdoptionFramework/master/plan/cloud-adoption-framework-strategy-and-plan-
template.docx
175
file. Or it might be a combination of these formats, depending on the organization's size, culture, and
standard practices. The security plan should include all of these elements:
●● Organizational functions plan, so teams know how current security roles and responsibilities will
change with the move to the cloud.
●● Security skills plan to support team members as they navigate the significant changes in technolo-
gy, roles, and responsibilities.
●● Technical security architecture and capabilities roadmap to guide technical teams.
●● Security awareness and education plan, so all teams have basic critical security knowledge.
●● Asset sensitivity marking to designate sensitive assets by using a taxonomy aligned to business
impact. The taxonomy is built jointly by business stakeholders, security teams, and other interested
parties.
●● Security changes to the cloud plan: Update other sections of the cloud adoption plan to reflect chang-
es triggered by the security plan.
●● Review Microsoft learnings and guidance: Microsoft has published insights and perspectives to help
your organization plan its transformation to the cloud and a modern security strategy. The material
includes recorded training, documentation, and security best practices and recommended standards.
Microsoft has built capabilities and resources to help accelerate your
implementation of this security guidance on Microsoft Azure. The
following diagram shows a holistic approach for using security guidance
and platform tooling to establish security visibility and control over
your cloud assets in Azure.
You can use this model to proactively and continuously monitor the
evolution of a security strategy, which includes evaluating new security
capabilities that may be added over time. The arrows represent the
continuous assessment of workloads to bring visibility, in this case
using Secure Score from Defender for Cloud and enforcing controls using
policies.
People:
●● Educate teams about the cloud security journey
●● Educate teams on cloud security technology
Process:
●● Assign accountability for cloud security decisions
●● Update incident response processes for cloud
●● Establish security posture management
Technology:
●● Require passwordless or multifactor authentication
●● Integrate native firewall and network security
●● Integrate native threat detection
Foundational architecture decisions:
●● Standardize on a single directory and identity
●● Use identity-based access control (instead of keys)
●● Establish a single unified security strategy
Each organization should define its own minimum standards. Risk posture
and subsequent tolerance to that risk can vary widely based on industry,
culture, and other factors. For example, a bank might not tolerate any
potential damage to its reputation from even a minor attack on a test
system. Some organizations would gladly accept that same risk if it
accelerated their digital transformation by three to six months.
Continuous assessment
Continuous assessment and validation of these systems is essential to
ensure secure configurations remain intact and previously unknown
vulnerabilities are identified. Continuous assessment is imperative to monitor the security posture of your
workloads, which can include virtual machines, networks, storage, and applications. Since Cloud Comput-
ing by nature is very dynamic, new workloads will be constantly provisioned and if your cloud adoption
isn't mature, you may not have all the guardrails in place to enforce security by default, which means that
continuous assessment of your workloads become even more critical.
In an IaaS and PaaS environment you can use Defender for Cloud
capabilities for continuous security assessment of your workloads.
Defender for Cloud fills three vital needs as you manage the security of
your resources and workloads in the cloud and on-premises:
Defender for Cloud continuously discovers new resources that are being
deployed across your workloads and assesses whether they're configured
according to security best practices. If not, they're flagged and you
get a prioritized list of recommendations for what you need to fix.
Recommendations help you reduce the attack surface across each of your
resources.
Deploying Microsoft Defender for Cloud enables the continuous assessment
of your organization's security posture and controls. It strengthens
the security posture of your cloud resources, and with its integrated
Microsoft Defender plans, Defender for Cloud protects workloads running
in Azure, hybrid, and other cloud platforms. Learn more about Microsoft
Defender for Cloud.
In a SaaS environment with Microsoft 365, you can use Compliance Manager
for continuous assessment. Compliance Manager automatically identifies
settings in your Microsoft 365 environment that help determine when
certain configurations meet improvement action implementation
requirements. Compliance Manager detects signals from other compliance
solutions you may have deployed, including data lifecycle management,
information protection, communication compliance, and insider risk
management, and also uses Microsoft Secure Score monitoring of
complementary improvement actions.
Your action status is updated on your dashboard within 24 hours of a
change being made. Once you follow a recommendation to implement a
control, you'll typically see the control status updated the next day.
For example, if you turn on Azure Active Directory Multi-Factor Authentication in the
Azure AD portal, Compliance Manager detects the setting and reflects it
in the control access solution details. Conversely, if you didn't turn
on MFA, Compliance Manager flags that as a recommended action for you to
take.
Continuous strategy evolution
The evolution of your security strategy over time requires you to set
high-level goals and continually assess progress towards those goals.
One method for doing this is to establish and monitor security metrics.
Microsoft recommends scorecard metrics in four main areas:
●● Business enablement – How much security friction is in user experience and business processes?
●● Security Improvement – Are we getting better every month?
●● Security Posture - How good are we at preventing damage?
●● Security Response – How good are we at responding to and recovering
from attacks?
Sample metrics in each of these categories are summarized in the
following table. These performance measurements can help get the
discussion started on how to measure success for a security program.
Ultimately these measures and the targets/thresholds/weightings will be
customized by each organization based on their business goals, risk
appetite, and technical portfolio, and more.
180
Exercise
Questions
1. Security Strategy
●● What are the security strategy principles that should be used in this project?
●● Who needs to approve the security strategy before it goes live?
2. Validating the solution
●● Which solution should Tailwind Traders utilize to understand the security state and risk across
resources in Azure?
●● Which product should Tailwind Traders utilize to define consistent security policies and enable
controls?
Summary
In this module you learned that as an architect you need to ensure all
teams are aligned to a single strategy that both enables and secures
enterprise systems and data. You learned about the security strategy
principles and key aspects that need to be taken into consideration when
planning your security strategy. You learned that a security strategy
provides not only guidance to all teams working on the technology, but
also influences processes, and people readiness for this adoption.
In addition, you learned about key deliverables and best practices for
security that need to be part of your adoption plan. You learned about
essential security practices, security management and the importance of
using a Proof of Concept (PoC) as an opportunity to deliver evidence
that the proposed solution solves business problems.
182
Visit the links below for more information about the topics covered in
this module:
●● Define a security strategy - Cloud Adoption Framework3
●● Get started: Secure the enterprise environment - Cloud Adoption Framework4
●● Cloud security architecture functions - Cloud Adoption Framework5
●● Chief Information Security Officer (CISO) Workshop, Module 2: Security Management - Security
documentation6
●● What's inside Microsoft Security Best Practices?7
3 https://docs.microsoft.com/azure/cloud-adoption-framework/strategy/define-security-strategy
4 https://docs.microsoft.com/azure/cloud-adoption-framework/get-started/security
5 https://docs.microsoft.com/azure/cloud-adoption-framework/organize/cloud-security-architecture
6 https://docs.microsoft.com/security/ciso-workshop/ciso-workshop-module-2
7 https://docs.microsoft.com/security/compass/microsoft-security-compass-introduction
183
Learning Objectives
In this module, you'll learn how to:
●● Specify security baselines for server and client endpoints
●● Specify security requirements for servers
●● Specify security requirements for mobile devices and clients
●● Specify requirements for securing Active Directory Domain Services
●● Design a strategy to manage secrets, keys, and certificates
●● Design a strategy for secure remote access
●● Understand security operations frameworks, processes, and procedures
●● Understand deep forensics procedures by resource type
confidential patient information. The one thing that all organizations have in common is a need to keep
their apps and devices secure. These devices must be compliant with the security standards (or security
baselines) defined by the organization.
A security baseline is a group of Microsoft-recommended configuration settings that explains their
security impact. These settings are based on feedback from Microsoft security engineering teams,
product groups, partners, and customers.
Security baselines are an essential benefit to customers because they bring together expert knowledge
from Microsoft, partners, and customers.
In modern organizations, the security threat landscape is constantly evolving, and IT pros and policymak-
ers must keep up with security threats and make required changes to security settings to help mitigate
these threats. To enable faster deployments and make managing Microsoft products easier, Microsoft
provides customers with security baselines that are available in consumable formats, such as Group Policy
Objects Backups.
Baselines principles
Our recommendations follow a streamlined and efficient approach to baseline definitions. The foundation
of that approach is essentially:
●● The baselines are designed for well-managed, security-conscious organizations in which standard end
users do not have administrative rights.
●● A baseline enforces a setting only if it mitigates a contemporary security threat and does not cause
operational issues that are worse than the risks they mitigate.
●● A baseline enforces a default only if it's otherwise likely to be set to an insecure state by an authorized
user:
●● If a non-administrator can set an insecure state, enforce the default.
●● If setting an insecure state requires administrative rights, enforce the default only if it's likely that a
misinformed administrator will otherwise choose poorly.
However, if the focus of your security baseline is to configure endpoint (Windows Client), you can use
Intune to automate the deployment and configuration. By using Intune capabilities, you can easily
deploy Windows security baselines to help you secure and protect your users and devices. You can
deploy security baselines to groups of users or devices in Intune, and the settings apply to devices that
run Windows 10/11. For example, the MDM Security Baseline automatically enables BitLocker for remova-
ble drives, automatically requires a password to unlock a device, automatically disables basic authentica-
tion, and more. When a default value doesn't work for your environment, customize the baseline to apply
the settings you need.
Separate baseline types can include the same settings but use different default values for those settings.
It's important to understand the defaults in the baselines you choose to use, and to then modify each
baseline to fit your organizational needs.
Is very important to emphasize that Intune security baselines are not CIS or NIST compliant. While
Microsoft security team consults organizations, such as CIS, to compile its recommendations, there's no
one-to-one mapping between “CIS-compliant” and Microsoft baselines.
The recommendations in these baselines are from the Microsoft security team's engagement with
enterprise customers and external agencies, including the Department of Defense (DoD), National
Institute of Standards and Technology (NIST), and more. Microsoft shares recommendations and base-
lines with these organizations. These organizations also have their own recommendations that closely
mirror Microsoft's recommendations. As mobile device management (MDM) continues to grow into the
cloud, Microsoft created equivalent MDM recommendations of these group policy baselines. These
additional baselines are built into Microsoft Intune, and include compliance reports on users, groups, and
devices that follow (or don't follow) the baseline. Security baselines can be found in the Endpoint security
configuration as shown below:
Pre-authentication with SMB 3.1.1 isn't compatible with devices that modify SMB packets, such as some
wide area network (WAN) accelerators. Therefore, you might need to replace some network equipment to
use SMB 3.1.1.
Once you access one of those recommendations, you'll see a set of rules that are using the Azure Guest
Configuration capability to run security checks to verify if the operating system is using the most secure
configurations.
Once you click on each rule, you'll have more details about the security check and the affected resources,
as shown in the image below:
8 https://docs.microsoft.com/azure/governance/policy/samples/guest-configuration-baseline-windows
9 https://docs.microsoft.com/azure/governance/policy/samples/guest-configuration-baseline-linux
188
When you specify security requirements for mobile devices, most of your focus will be on the Configure
and Protect stages, but you should also have general considerations on each one of the other phases:
●● Enroll: evaluate the types of devices you have in your organization and verify the enrollment op-
tions10 available.
●● Configure: to ensure that your devices are secure and compliant with company standards, you can
choose from a wide range of policies during the initial configuration11 of the device.
●● Protect: protecting devices from unauthorized access is one of the most important tasks that you
perform. In addition to the items that were established in the initial configuration, you have addition
settings to protect your devices from unauthorized access or malicious attack.
●● Retire: When a device gets lost or stolen, when it needs to be replaced, or when users move to
another position, it's usually time to retire or wipe the device. There are many ways you can do
this—including resetting the device, removing it from management, and wiping the corporate data on
it.
10 https://docs.microsoft.com/mem/intune/enrollment/device-enrollment
11 https://docs.microsoft.com/mem/intune/configuration/device-profiles
190
Intune app protection policies help protect your work files on devices that are enrolled into Intune. You
can also use app protection policies on employee-owned devices that are not enrolled for management
in Intune. In this case, even though your company doesn't manage the device, you still need to make sure
that work files and resources are protected.
In the example below, the admin has applied app protection policies to the Outlook app. This is followed
by a conditional access rule that adds the Outlook app to an approved list of apps. This list can be used
when accessing corporate e-mail.
In a scenario like this, you could use the app protection to enforce the security requirements for your
mobile devices, which could include:
●● Encrypt work files.
●● Require a PIN to access work files.
●● Require the PIN to be reset after five failed attempts.
191
●● Block work files from being backed up in iTunes, iCloud, or Android backup services.
●● Require work files to only be saved to OneDrive or SharePoint.
●● Prevent protected apps from loading work files on jailbroken or rooted devices.
●● Block access to work files if the device is offline for 720 minutes.
●● Remove work files if device is offline for 90 days.
Device settings
Besides the app isolation and protection on the device, you also need to ensure that the device's settings
are securely configured. With the Mobility and Security feature, you can manage and secure mobile
devices when they're connected to your Microsoft 365 organization. Mobile devices like smartphones and
tablets that are used to access work email, calendar, contacts, and documents play a big part in making
sure that employees get their work done anytime, from anywhere. So, it's critical that you help protect
your organization's information when people use devices. You can use Basic Mobility and Security to set
device security policies and access rules. You can also use it to wipe mobile devices if they're lost or
stolen.
Basic Mobility and Security can help you secure and manage mobile devices like iPhones, iPads, Androids,
and Windows Phones used by licensed Microsoft 365 users in your organization. You can create mobile
device management policies with settings that can help control access to your organization's Microsoft
365 email and documents for supported mobile devices and apps. If a device is lost or stolen, you can
remotely wipe the device to remove sensitive organizational information.
Hardening options for mobile devices must include the following requirements:
●● Require a password
●● Prevent simple password
●● Require an alphanumeric password
●● Minimum password length
●● Number of sign-in failures before device is wiped
●● Minutes of inactivity before device is locked
●● Password expiration (days)
●● Remember password history and prevent reuse
●● Require data encryption on devices
●● Device can't be jail broken or rooted
●● Block screen capture
●● Require password when accessing application store
When establishing your security requirement for mobile devices, make sure that the security setting that
you want to manage is available for the type of device that your organization utilizes. For more informa-
tion about how to manage mobile devices that connect to your Microsoft 365 organization according to
each type of device, visit this article12.
12 https://docs.microsoft.com/microsoft-365/admin/basic-mobility-security/capabilities
192
Client requirements
One important consideration to take is if your client workstation is domain joined. Many environments
use on-premises Active Directory (AD). When AD domain-joined devices are also joined to Azure AD,
they're called hybrid Azure AD joined devices. Using Windows Autopilot, you can enroll hybrid Azure AD
joined devices in Intune. To enroll, you also need a Domain Join configuration profile.
Once you determine if the client is domain joined or not, you can start planning the security requirements
for the operating system configuration. The requirements can also be part of the security baseline that
was initially selected. You can deploy security baselines to groups of users or devices in Intune, and the
settings apply to devices that run Windows 10/11. For example, the MDM Security Baseline automatically
enables BitLocker for removable drives, automatically requires a password to unlock a device, automati-
cally disables basic authentication, and more. When a default value doesn't work for your environment,
customize the baseline to apply the settings you need.
Client security requirements should include security policies that can manage the following settings:
●● Antivirus13
●● Disk encryption14
●● Windows firewall15
●● Endpoint Detection and Response (EDR)16
●● Attack surface reduction17
●● Account protection18
13 https://docs.microsoft.com/mem/intune/protect/endpoint-security-antivirus-policy
14 https://docs.microsoft.com/mem/intune/protect/endpoint-security-disk-encryption-policy
15 https://docs.microsoft.com/mem/intune/protect/endpoint-security-firewall-policy
16 https://docs.microsoft.com/mem/intune/protect/endpoint-security-edr-policy
17 https://docs.microsoft.com/mem/intune/protect/endpoint-security-asr-policy
18 https://docs.microsoft.com/mem/intune/protect/endpoint-security-account-protection-policy
193
credential-theft attack. Although attackers also target VIP accounts, if VIPs are not given high levels of
privilege on systems or in the domain, theft of their credentials requires other types of attacks, such as
socially engineering the VIP to provide secret information.
The core vulnerability that allows credential theft attacks to succeed is the act of logging on to computers
that are not secure with accounts that are broadly and deeply privileged throughout the environment.
Which means that among the requirements to secure AD DS you need to ensure that you're reducing the
attack surface, which includes the following tasks:
●● Implementing Least-Privilege Administrative Models: focuses on identifying the risk that the use
of highly privileged accounts for day-to-day administration presents, in addition to providing recom-
mendations to implement to reduce the risk that privileged accounts present.
●● Implementing Secure Administrative Hosts: describes principles for deployment of dedicated,
secure administrative systems, in addition to some sample approaches to a secure administrative host
deployment.
●● Securing Domain Controllers Against Attack: discusses policies and settings that, although similar
to the recommendations for the implementation of secure administrative hosts, contain some domain
controller-specific recommendations to help ensure that the domain controllers and the systems used
to manage them are well-secured.
In addition, you should never administer a trusted system (that is, a secure server such as a domain
controller) from a less-trusted host (that is, a workstation that isn't secured to the same degree as the
systems it manages). Also, do not rely on a single authentication factor when performing privileged
activities; that is, username and password combinations should not be considered acceptable authentica-
tion because only a single factor (something you know) is represented. You should consider where
credentials are generated and cached or stored in administrative scenarios.
Although it may seem counterintuitive, you should consider patching domain controllers and other
critical infrastructure components separately from your general Windows infrastructure. If you use
enterprise configuration management software for all computers in your infrastructure, compromise of
the systems management software can be used to compromise or destroy all infrastructure components
managed by that software. By separating patch and systems management for domain controllers from
the general population, you can reduce the amount of software installed on domain controllers, in
addition to tightly controlling their management.
In addition, make sure to:
●● Continuously monitor Active Directory for signs of compromise19 using tools such as Microsoft
Defender for Identity20
●● Enable and review audit policy21
Once you install the Defender for Identity sensor directly on your domain controller or AD FS server, it
accesses the event logs it requires directly from each server. After the logs and network traffic are parsed
by the sensor, Defender for Identity sends only the parsed information to the Defender for Identity cloud
service (only a percentage of the logs are sent).
19 https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/monitoring-active-directory-for-signs-of-
compromise
20 https://docs.microsoft.com/defender-for-identity/sensor-monitoring
21 https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/audit-policy-recommendations
195
them in a single central location and providing secure access, permissions control, and access logging.
There are three primary concepts used in an Azure Key Vault: vaults, keys, and secrets.
You use Azure Key Vault to create multiple secure containers, called vaults. Vaults help reduce the chances
of accidental loss of security information by centralizing application secrets storage. Organizations will
have several key vaults. Each key vault is a collection of cryptographic keys and cryptographically protect-
ed data (call them “secrets”) managed by one or more responsible individuals within your organization.
These key vaults represent the logical groups of keys and secrets for your organization; those that you
want to manage together. They are like folders in the file system. Key vaults also control and log the
access to anything stored in them.
Keys are the central actor in the Azure Key Vault service. A given key in a key vault is a cryptographic asset
destined for a particular use such as the asymmetric master key of Microsoft Azure RMS, or the asymmet-
ric keys used for SQL Server TDE (Transparent Data Encryption), CLE (Column Level Encryption) and
Encrypted backup.
Secrets are small (less than 10K) data blobs protected by a HSM-generated key created with the Key Vault.
Secrets exist to simplify the process of persisting sensitive settings that almost every application has:
storage account keys, .PFX files, SQL connection strings, data encryption keys, etc.
Azure Key Vault enables Microsoft Azure applications and users to store and use certificates, which are
built on top of keys and secrets and add an automated renewal feature.
When designing your strategy to maintain Key Vault, make sure to include the following security best
practices:
Authentication
Azure Key Vault uses Azure Active Directory (Azure AD) to authenticate users and apps that try to access
a vault. Authentication is always performed by associating the authenticated identity of any user or app
making a request with the Azure AD tenant of the subscription where the Key Vault resides. There is no
support for anonymous access to a Key Vault.
Authorization
Management operations (creating a new Azure Key Vault) use role-based access control (RBAC). There is
a built-in role Key Vault Contributor that provides access to management features of key vaults, but
doesn't allow access to the key vault data. This is the recommended role to use. There's also a Contribu-
tor role that includes full administration rights - including the ability to grant access to the data plane.
Reading and writing data in the Key Vault uses a separate Key Vault access policy. A Key Vault access
policy is a permission set assigned to a user or managed identity to read, write, and/or delete secrets and
keys. You can create an access policy using the CLI, REST API, or Azure portal.
Virtual Network subnets, specific IP addresses, or trusted Microsoft services including Azure SQL, Azure
App Service, and various data and storage services that use encryption keys.
Manage certificate
Securely managing certificates is a challenge for every organization. You must ensure that the private key
is kept safe, and certificates have an expiration date, which means you need to renew periodically to
ensure your website traffic is secure.
Azure Key Vault manages X.509 based certificates that can come from several sources. One strategy is to
create self-signed certificates directly in the Azure portal. This process creates a public/private key pair
and signs the certificate with its own key. These certificates can be used for testing and development.
Another strategy is to create an X.509 certificate signing request (CSR). This creates a public/private key
pair in Key Vault along with a CSR you can pass over to your certification authority (CA). The signed X.509
certificate can then be merged with the held key pair to finalize the certificate in Key Vault as shown in
the following diagram.
In the previous diagram, your application is creating a certificate which internally begins by creating a key
in your Azure Key Vault.
1. Key Vault returns a Certificate Signing Request (CSR) to your application.
2. Your application passes the CSR to your chosen CA.
3. Your chosen CA responds with an X.509 Certificate.
4. Your application completes the new certificate creation with a merger of the X.509 Certificate from
your CA.
This strategy works with any certificate issuer and provides better security than handling the CSR directly
because the private key is created and secured in Azure Key Vault and never revealed.
198
Lastly, you can also connect your Key Vault with a trusted certificate issuer (referred to as an integrated
CA) and create the certificate directly in Azure Key Vault. This approach requires a one-time setup to
connect the certificate authority. You can then request to create a certificate and the Key Vault will
interact directly with the CA to fulfill the request in a similar process to the manual CSR creation process
shown above. The full details of this process are presented in the following diagram.
1. In the previous diagram, your application is creating a certificate which internally begins by creating a
key in your key vault.
2. Key Vault sends an SSL Certificate Request to the CA.
3. Your application polls, in a loop and wait process, for your Key Vault for certificate completion. The
certificate creation is complete when Key Vault receives the CA's response with x509 certificate.
4. The CA responds to Key Vault's SSL Certificate Request with an X509 SSL Certificate.
5. Your new certificate creation completes with the merger of the X509 Certificate for the CA.
This approach has several distinct advantages. Because the Key Vault is connected to the issuing CA, it
can manage and monitor the lifecycle of the certificate. That means it can automatically renew the
certificate, notify you about expiration, and monitor events such as whether the certificate has been
revoked.
The Azure point-to-site solution is cloud-based and can be provisioned quickly to cater for the increased
demand of users to work from home. It can scale up easily and turned off just as easily and quickly when
the increased capacity isn't needed anymore. A Point-to-Site (P2S) VPN gateway connection lets you
create a secure connection to your virtual network from an individual client computer. A P2S connection
is established by starting it from the client computer. This solution is useful for telecommuters who want
to connect to Azure VNets or on-premises datacenters from a remote location, such as from home or a
conference. You could use this solution if of your design requirements states that remote users need to
access to resources that are in Azure and in the on-premises datacenters as shown in the image below:
At a high level, the following steps are needed to enable users to connect to Azure resources securely:
1. Create a virtual network gateway (if one does not exist).
2. Configure point-to-site VPN on the gateway
3. Configure a site-to-site tunnel on the Azure virtual network gateway with BGP enabled.
4. Configure the on-premises device to connect to Azure virtual network gateway.
5. Download the point-to-site profile from the Azure portal and distribute to clients
If your design requirements states that you need to connect two sites, for example headquarter and
branch office, you could use Site-to-Site VPN. A Site-to-Site (S2S) VPN gateway connection is a connec-
tion over IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. S2S connections can be used for cross-premises and
hybrid configurations. A S2S connection requires a VPN device located on-premises that has a public IP
address assigned to it.
In some scenarios, the remote worker may just need access to resources deployed in Azure, for this
scenario the remote worker could use Azure Bastion solution, instead of VPN connection to get secure
shell access using Remote Desktop Protocol (RDP) or Secure Shell Protocol (SSH) without requiring public
IPs on the VMs being accessed, as shown in the example below:
200
Benefit Description
RDP and SSH through the Azure portal You can get to the RDP and SSH session directly in
the Azure portal using a single-click seamless
experience.
Remote Session over TLS and firewall traversal for Azure Bastion uses an HTML5 based web client
RDP/SSH that is automatically streamed to your local device.
Your RDP/SSH session is over TLS on port 443. This
enables the traffic to traverse firewalls more
securely.
No Public IP address required on the Azure VM Azure Bastion opens the RDP/SSH connection to
your Azure VM by using the private IP address on
your VM. You don't need a public IP address on
your virtual machine.
No hassle of managing Network Security Groups You don't need to apply any NSGs to the Azure
(NSGs) Bastion subnet. Because Azure Bastion connects to
your virtual machines over private IP, you can
configure your NSGs to allow RDP/SSH from Azure
Bastion only. This removes the hassle of managing
NSGs each time you need to securely connect to
your virtual machines.
No need to manage a separate bastion host on a Azure Bastion is a fully managed platform PaaS
VM service from Azure that is hardened internally to
provide you secure RDP/SSH connectivity.
201
Benefit Description
Protection against port scanning Your VMs are protected against port scanning by
rogue and malicious users because you don't need
to expose the VMs to the internet.
Hardening in one place only Azure Bastion sits at the perimeter of your virtual
network, so you don€™t need to worry about
hardening each of the VMs in your virtual network.
Protection against zero-day exploits The Azure platform protects against zero-day
exploits by keeping the Azure Bastion hardened
and always up to date for you.
Work from home policies requires many IT organizations to address fundamental changes in capacity,
network, security, and governance. Employees aren't protected by the layered security policies associated
with on-premises services while working from home. This type of scenario could lead you to choose a
solution where you can respond faster to changes in the environment, and that€™s where the use of
Virtual Desktop Infrastructure (VDI) becomes appropriate. VDI deployments on Azure can help organiza-
tions rapidly respond to this changing environment. However, you need a way to protect inbound/
outbound Internet access to and from these VDI deployments. You can use Azure Firewall DNAT rules
along with its threat intelligence-based filtering capabilities to protect your VDI deployments.
Azure Virtual Desktop is a comprehensive desktop and app virtualization service running in Azure. It's the
only virtual desktop infrastructure (VDI) that delivers simplified management, multi-session Windows
10/11, optimizations for Microsoft 365 apps for enterprise, and support for Remote Desktop Services
(RDS) environments. You can deploy and scale your Windows desktops and apps on Azure in minutes,
and get built-in security and compliance features. Azure Virtual Desktop doesn't require you to open any
inbound access to your virtual network. However, you must allow a set of outbound network connections
for the Azure Virtual Desktop virtual machines that run in your virtual network.
●● Reduce the time to remediate a detected adversary. Reduce their opportunity time to conduct and
attack and reach sensitive systems.
●● Prioritize security investments into systems that have high intrinsic value. For example, administrator
accounts.
●● Proactively hunt for adversaries as your system matures. This effort will reduce the time that a higher
skilled adversary can operate in the environment. For example, skilled enough to evade reactive alerts.
SecOps has multiple potential interactions with business leadership, which includes:
●● Business context to SecOps: SecOps must understand what is most important to the organization so
that the team can apply that context to fluid real-time security situations. What would have the most
negative impact on the business? Downtime of critical systems? A loss of reputation and customer
trust? Disclosure of sensitive data? Tampering with critical data or systems? We've learned it's critical
that key leaders and staff in the SOC understand this context. They'll wade through the continuous
flood of information and triage incidents and prioritize their time, attention, and effort.
●● Joint practice exercises with SecOps: Business leaders should regularly join SecOps in practicing
response to major incidents. This training builds the muscle memory and relationships that are critical
to fast and effective decision making in the high pressure of real incidents, reducing organizational
risk. This practice also reduces risk by exposing gaps and assumptions in the process that can be fixed
before a real incident occurs.
●● Major incidents updates from SecOps: SecOps should provide updates to business stakeholders for
major incidents as they happen. This information allows business leaders to understand their risk and
take both proactive and reactive steps to manage that risk.
●● Business intelligence from the SOC: Sometimes SecOps finds that adversaries are targeting a system
or data set that isn't expected. As these discoveries are made, the threat intelligence team should
share these signals with business leaders as they might trigger insight for business leaders. For
example, someone outside the company is aware of a secret project or unexpected attacker targets
highlight the value of an otherwise overlooked dataset.
Attacks on your organization are also planned and conducted by people like criminals, spies, and hacktiv-
ists. While some commodity attacks are fully automated, the most damaging ones are often done by live
human attack operators.
●● Focus on empowering people: your goal shouldn't be to replace people with automation. Empower
your people with tools that simplify their daily workflows. These tools enable them to keep up with or
get ahead of the human adversaries they face.
Rapidly sorting out signal (real detections) from the noise (false positives) requires investing in both
humans and automation. Automation and technology can reduce human work, but attackers are
human and human judgment is critical in defeating them.
●● Diversify your thinking portfolio: security operations can be highly technical, but it's also just
another new version of forensic investigation that shows up in many career fields like criminal justice.
Don't be afraid to hire people with a strong competency in investigation or deductive or inductive
reasons and train them on technology.
Metrics
Metrics drive behavior, so measuring success is a critical element to get right. Metrics translate culture
into clear measurable goals that drive outcomes.
We've learned that it's critical to consider what you measure, and the ways that you focus on and enforce
those metrics. Recognize that security operations must manage significant variables that are out of their
direct control, like attacks and attackers. Any deviations from targets should be viewed primarily as a
learning opportunity for process or tool improvement, rather than assumed to be a failure by the SOC to
meet a goal.
The main metrics to focus on that have a direct influence on organizational risk are:
●● Mean time to acknowledge (MTTA): Responsiveness is one of the few elements SecOps has more
direct control over. Measure the time between an alert, like when the light starts to blink, and when an
analyst sees that alert and begins the investigation. Improving this responsiveness requires that
analysts don't waste time investigating false positives. It can be achieved with ruthless prioritization,
ensuring that any alert feed that requires an analyst response must have a track record of 90 percent
true positive detections.
●● Mean time to remediate (MTTR): Effectiveness of reducing risk measures the next period of time.
That period is the time the analyst begins the investigation to when the incident is remediated. MTTR
identifies how long it takes SecOps to remove the attacker's access from the environment. This
information helps identify where to invest in processes and tools to help analysts reduce risk.
●● Incidents remediated (manually or with automation): Measuring how many incidents are remedi-
ated manually and how many are resolved with automation is another key way to inform staffing and
tool decisions.
●● Escalations between each tier: Track how many incidents escalated between tiers. It helps ensure
accurate tracking of the workload to inform staffing and other decisions. For example, so that work
done on escalated incidents isn't attributed to the wrong team.
Companies must guarantee that digital evidence they provide in response to legal requests demonstrates
a valid Chain of Custody (CoC) throughout the evidence acquisition, preservation, and access process. To
ensure a valid CoC, digital evidence storage must demonstrate adequate access control, data protection
and integrity, monitoring and alerting, and logging and auditing. The main use cases are:
●● A company's Security Operation Center (SOC) team can implement this technical solution to support a
valid CoC for digital evidence
●● Investigators can attach disk copies obtained with this technique on a computer dedicated to forensic
analysis, without re-creating, powering on, or accessing the original source VM
Only two individuals within the SOC team should have rights to modify the controls governing access to
the subscription and its data. Grant other individuals only bare minimum access to data subsets they
need to perform their work. Configure and enforce access through Azure role-based access control
(Azure RBAC). Only the virtual network in the SOC subscription has access to the Storage account. Azure
Audit Logs can show evidence acquisition by recording the action of taking a VM disk snapshot, with
elements like who took the snapshot, how, and where.
Endpoint forensics
Microsoft Defender for Endpoint provides detailed device information, including forensics information.
You are a Security Operations Analyst working at a company that has implemented Microsoft Defender
for Endpoint, and your primary job is to remediate incidents.
Live response gives security operations teams instantaneous access to a device (also referred to as a
machine) using a remote shell connection. This forensics information gives you the power to do in-depth
investigative work and take immediate response actions to promptly contain identified threats in real
time. Live response is designed to enhance investigations by enabling your security operations team to
collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and proactively
hunt for emerging threats.
Watch the video below for a demonstration on live response feature.
[!VIDEO https://www.microsoft.com/videoplayer/embed/RE4qLUW]
With live response, analysts can do all of the following tasks:
●● Run basic and advanced commands to do investigative work on a device.
●● Download files such as malware samples and outcomes of PowerShell scripts.
●● Download files in the background (new!).
●● Upload a PowerShell script or executable to the library and run it on a device from a tenant level.
●● Take or undo remediation actions.
Depending on the role that's been granted to you, you can run basic or advanced live response com-
mands. User permissions are controlled by RBAC custom roles. Live response is a cloud-based interactive
shell. Specific command experience may vary in response time depending on network quality and system
load between the end user and the target device.
As part of the investigation or response process, you can collect an investigation package from a device.
By collecting the investigation package, you can identify the current state of the device and further
understand the tools and techniques used by the attacker. This data collection includes the following
artifacts:
●● Autoruns
●● Installed programs
205
●● Network connections
●● Windows Prefetch files
●● Processes
●● Scheduled tasks
●● Security event log
●● List of services
●● Windows Server Message Block (SMB) sessions
●● System information
●● Temp directories
●● User and groups
Exercise
Tailwind Traders is a modern commerce company. For more than 30 years, the company has been a
popular retail destination. It has grown to more than 50 physical stores. Several years ago, its chief
executive officer (CEO) anticipated changes in retail and bought a competing e-commerce start-up that
was growing aggressively in niche markets. Today, the company is seen as an innovative leader with
customer-focused local storefronts.
The retail innovation team reports to the company's chief technology officer (CTO), who was the CEO of
the acquired e-commerce start-up. Those technology solutions are the main hub for interactions with
customers. Those solutions affect 60 percent of global revenue and produce 30 percent of annual gross
sales.
The new CIO is focused on improving technical operations in multiple areas to fuel greater innovation
throughout the company while limiting disruptions to core business operations. The cloud will play an
important role in this transition. One of the key requirements for this transformation is to empower
remote workers in a secure manner. The new CIO wants to ensure remote workers can connect to cloud
resources without having to expose management ports on their cloud workloads and that remote branch
offices can stay always connected with company's headquarter.
The CISO understands that in the current threat landscape, most of the attacks are targeting the end-
points. He needs to establish a new security baseline to harden all endpoints and provide a seamless
experience to deploy these baselines across the clients. The CISO also wants to empower the SOC Team
to perform investigations on the endpoints to better understand the root cause of an attack.
Questions
1. Remote access:
●● Which solution should you use to enable the CIO vision regarding the connectivity for remote
workers?
●● Which solution should you use for the remote branches?
206
2. Endpoint strategy:
Summary
In this module you learned how to specify security baseline for clients'
endpoints based on the different options that are available. You learned
that the selection of the appropriate security baseline starts with the
understanding of which operating system the security baseline needs to
be applied to. You learned how to define the security requirements for
servers and the importance of understanding the server's role as the
server's role will dictate the hardening settings that should be
applied.
You learned how to specify security requirements for mobile devices and
clients. The considerations regarding application isolation and
operating system hardening. In addition, you learned more how to specify
requirements for securing Active Directory Domain Services, and how to
design a strategy to manage secrets, keys, and certificates.
In addition, you learned the options available for remote access and the
security operations frameworks, processes, and procedures. Lastly, you
learned about some capabilities available in Windows 10/11 that can help
you during forensics investigation.
Visit the links below for more information about the topics covered in
this module:
●● Working remotely using Azure networking services22
●● Azure Bastion23
●● Best Practices for Securing Active Directory24
●● Azure Key Vault security overview25
●● Security Operations Center (SOC or SecOps) monitoring in Azure - Microsoft Azure Well-Archi-
tected Framework26
●● Security operations - Cloud Adoption Framework27
●● Investigate entities on devices using live response in Microsoft Defender for Endpoint28
●● Computer forensics chain of custody in Azure - Azure Example Scenarios29
22 https://docs.microsoft.com/azure/networking/working-remotely-support
23 https://docs.microsoft.com/azure/bastion/bastion-overview
24 https://docs.microsoft.com/windows-server/identity/ad-ds/plan/security-best-practices/best-practices-for-securing-active-directory
25 https://docs.microsoft.com/azure/key-vault/general/security-features
26 https://docs.microsoft.com/azure/architecture/framework/security/monitor-security-operations
27 https://docs.microsoft.com/azure/cloud-adoption-framework/secure/security-operations
28 https://docs.microsoft.com/microsoft-365/security/defender-endpoint/live-response
29 https://docs.microsoft.com/azure/architecture/example-scenario/forensics/
207
Learning Objectives
In this module, you'll learn how to:
●● Specify security baselines for PaaS services
●● Specify security baselines for IaaS services
●● Specify security baselines for SaaS services
●● Specify security requirements for IoT workloads
●● Specify security requirements for data workloads
●● Specify security requirements for web workloads
●● Specify security requirements for storage workloads
●● Specify security requirements for containers
●● Specify security requirements for container orchestration
Microsoft mitigates common risks and responsibilities starting at the bottom of the stack: the physical
infrastructure. Because the Microsoft cloud is continually monitored by Microsoft, it's hard to
attack. It doesn't make sense for an attacker to pursue the Microsoft cloud as a target. Unless the attacker
has lots of money and resources, the attacker is likely to move on to another target.
In the middle of the stack, there's no difference between a PaaS
deployment and on-premises. At the application layer and the account and
access management layer, you have similar risks. In the next steps
section of this article, we will guide you to best practices for
eliminating or minimizing these risks.
At the top of the stack, data governance and rights management, you take
on one risk that can be mitigated by key management. (Key management is
covered in best practices.) While key management is an additional
responsibility, you have areas in a PaaS deployment that you no longer
have to manage so you can shift resources to key management.
The Azure platform also provides you strong DDoS protection by using
various network-based technologies. However, all types of network-based
DDoS protection methods have their limits on a per-link and
per-datacenter basis. To help avoid the impact of large DDoS attacks,
you can take advantage of Azure's core cloud capability of enabling you
to quickly and automatically scale out to defend against DDoS attacks.
With PaaS deployments come a shift in your overall approach to security.
You shift from needing to control everything yourself to sharing
responsibility with Microsoft. Another significant difference between
PaaS and traditional on-premises deployments is a new view of what
defines the primary security perimeter. Historically, the primary
on-premises security perimeter was your network, and most on-premises
security designs use the network as its primary security pivot. For PaaS
deployments, you're better served by considering identity to be the
primary security perimeter.
Microsoft Defender for Cloud has security recommendations that are based
on Azure Security Benchmark for all supported PaaS services. The list of
supported PaaS services can be found below:
30 https://docs.microsoft.com/security/benchmark/azure/baselines/app-service-security-baseline
211
Once you identify the resource, you can click on it and see the open
security recommendations as shown below:
This list provides the list of recommendations, which are derived from
Azure Security Benchmark, organized by priority and showing the current
status (healthy or unhealthy).
you use Azure AD authentication for Linux VMs, you centrally control and
enforce policies that allow or deny access to the VMs.
31 https://docs.microsoft.com/azure/governance/policy/samples/guest-configuration-baseline-windows
32 https://docs.microsoft.com/azure/governance/policy/samples/guest-configuration-baseline-linux
213
As you open each recommendation, you'll see the security checks that
were performed, and when you select a security check, you'll see more
details about the impact, the vulnerability and remediation as shown
below:
●● Cloud gateways
●● Services
Zones are a broad way to segment a solution; each zone often has its own
data and authentication and authorization requirements. Zones can also
be used to isolation damage and restrict the impact of low trust zones
on higher trust zones. Each zone is separated by a Trust Boundary, and
it represents a transition of data/information from one source to
another. During this transition, the data/information could be subject
to Spoofing, Tampering, Repudiation, Information Disclosure, Denial of
Service and Elevation of Privilege (STRIDE).
Defender for IoT connects to both cloud and on-premises components and
is built for scalability in large and geographically distributed
environments. Defender for IoT systems includes the following components:
●● The Azure portal, for cloud management and integration to other
Microsoft services, such as Microsoft Sentinel
●● Network sensors, deployed on either a virtual machine or a physical
appliance. You can configure your OT sensors as cloud-connected
sensors, or fully on-premises sensors.
●● An on-premises management console for cloud-connected or local,
air-gapped site management.
●● An embedded security agent (optional).
218
It's also important that you can integrate the threat detection
generated by your security IoT solution with your SIEM solution.
Microsoft Sentinel and Microsoft Defender for IoT help to bridge the gap
between IT and OT security challenges, and to empower SOC teams with
out-of-the-box capabilities to detect and respond to OT threats
efficiently and effectively. The integration between Microsoft Defender
for IoT and Microsoft Sentinel helps organizations to quickly detect
multistage attacks, which often cross IT and OT boundaries.
Task Owner
1. Determine data classification levels. Data Security Architect
219
Task Owner
2. Determine built-in and custom sensitive infor- Data Security Architect
mation types.
3. Determine the use of pre-trained and custom Data Security Architect
trainable classifiers.
4. Discover and classify sensitive data. Data Security Architect and/or Data Security
Engineer
Once you know your data, you can establish key requirements such as:
●● Data protection across all data workloads: protect your
sensitive data throughout its lifecycle by applying sensitivity
labels linked to protection actions like encryption, access
restrictions, visual markings, and more.
●● Prevent data loss: apply a consistent set of data loss
prevention policies across the cloud, on-premises environments, and
endpoints to monitor, prevent, and remediate risky activities with
sensitive data.
●● Use least privilege access: apply minimal permissions consisting
of who is allowed to access and what they're allowed to do with
data to meet business and productivity requirements.
Microsoft Defender for Cloud integration with Azure Purview allows you
to obtain vital layer of metadata from Azure Purview and use in alerts
and recommendations: information about any potentially sensitive data
involved. This knowledge helps solve the triage challenge and ensures
security professionals can focus their attention on threats to sensitive
data. The example below shows a SQL database status in Defender for
Cloud, with the data enrichment coming from Azure Purview in the low
left corner:
Databases
Data workloads include databases, and to provide security posture
management for databases you can use Microsoft Defender for SQL.
Microsoft Defender for Cloud is available for Azure SQL Database, Azure
SQL Managed Instance, and Azure Synapse Analytics. It includes
functionality for surfacing and mitigating potential database
vulnerabilities and detecting anomalous activities that could indicate a
threat to your database. It provides a single go-to location for
enabling and managing these capabilities. Security recommendations for
SQL database will be surfaced in Defender for Cloud as shown the screen
below:
221
Exercise
Those technology solutions are the main hub for interactions with
customers. Those solutions affect 60 percent of global revenue and
produce 30 percent of annual gross sales.
The new CIO is focused on improving technical operations in multiple
areas to fuel greater innovation throughout the company while limiting
disruptions to core business operations. The cloud will play an
important role in this transition. To accomplish this vision the CIO
hired a new Chief Information Security Officer (CISO). The new CISO
started planning his strategy to secure PaaS, IaaS and SaaS workloads,
and as part of this strategy he established that the company needs to:
●● Implement a cloud security posture management platform that can
offer native vulnerability assessment for VMs and Containers, and
support threat detection for Cosmos DB
●● Implement a data classification system for their Azure workloads
that is able to classify and label data in SQL databases and storage
accounts
●● Implement a security baseline for SaaS workloads in Microsoft 365
●● Support security posture management and threat detection for IoT
workloads
Questions
1. Which solution should be utilized to:
●● Provide data classification and labeling in Azure?
●● Provide cloud security posture management and threat detection for VM, Containers and Cosmos
DB?
2. Which solution should be used to provide cloud security posture management and threat detection
for IoT?
Summary
In this module you learned how to specify security baselines for PaaS workloads, and which Azure PaaS
workloads are supported by Microsoft Defender for Cloud. You also learned how to specify a security
baseline for IaaS VMs, and the general guidelines that you can enforce regardless of the operating
system. You learned about the use of Microsoft Secure Score to track security posture enhancement over
time in a SaaS environment and the security requirements for IoT workloads.
You also learned the security requirements for Azure App Service and how to use Microsoft Defender for
App Service to provide posture management and threat detection for this type of workload. You learned
about the requirements for data and storage workloads, and how Azure Purview can help with data
classification and labeling. Lastly, you learned about the security requirements for containers and contain-
er orchestration.
Visit the links below for more information about the topics covered in
this module:
●● Best practices for secure PaaS deployments - Microsoft Azure33
33 https://docs.microsoft.com/azure/security/fundamentals/paas-deployments
231
●● Overview of the Office cloud policy service for Microsoft 365 Apps for enterprise - Deploy
Office34
●● Security recommendations for Azure IoT35
●● Microsoft Defender for IoT for organizations documentation36
●● Data37
●● Introduction to Azure Purview - Azure Purview38
●● Security - Azure App Service39
●● Microsoft Defender for Storage - the benefits and features40
●● Container security with Microsoft Defender for Cloud41
34 https://docs.microsoft.com/deployoffice/admincenter/overview-office-cloud-policy-service
35 https://docs.microsoft.com/azure/iot-fundamentals/security-recommendations
36 https://docs.microsoft.com/azure/defender-for-iot/organizations/
37 https://docs.microsoft.com/security/zero-trust/data-compliance-gov-data
38 https://docs.microsoft.com/azure/purview/overview
39 https://docs.microsoft.com/azure/app-service/overview-security
40 https://docs.microsoft.com/azure/defender-for-cloud/defender-for-storage-introduction
41 https://docs.microsoft.com/azure/defender-for-cloud/defender-for-containers-introduction?tabs=defender-for-container-arch-aks
232
Knowledge check
Check your Knowledge
Multiple choice
Item 1. How can Tailwind Traders reference Microsoft Zero Trust Architecture?
Develop security requirements based on the organizational financial goals.
Identify the integration points for architecture using Microsoft Cybersecurity Reference Architecture
(MCRA).
Provide familiar security tools and significantly enhanced levels of network security.
Multiple choice
Item 2. Security helps create assurances for a business based on three major elements. Which one isn't part
of this list?
Confidentiality
Availability
Redundancy
Multiple choice
Item 3. A security strategy must enable defined business outcomes while:
Reducing risk to an acceptable level and enable employees to be productive.
Reducing risk to zero and enable employees to be productive.
Reducing risk to an acceptable level and enable partners.
Multiple choice
Item 4. Which one of the options below isn't a key security strategy principle?
Productivity and security
Shared responsibility
Reduce compromise
Multiple choice
Item 5. Microsoft has built capabilities and resources to help accelerate your implementation of this security
guidance on Microsoft Azure. Which tool is responsible for continuous assessment of the workloads and
provides security visibility via Secure Score?
Azure Security Benchmark
Microsoft Defender for Cloud
Microsoft Sentinel
233
Multiple choice
Item 6. Security management strategy is composed by some imperative principles. Given the following
definition, which principle does it relate to? "Elevate security through built-in intelligence and recommenda-
tions".
Visibility
Control
Guidance
Multiple choice
Item 7. When selecting the appropriate baseline to use, which tool should you use to analyze, test, edit, and
store Microsoft-recommended security configuration baselines for Windows?
Group Policy
Security Compliance Toolkit (SCT)
Azure Security Benchmark (ASB)
Multiple choice
Item 8. Which tool should you use if you need to provide guidance for OS hardening and security baseline
for Windows and Linux?
Group Policy
Security Compliance Toolkit (SCT)
Azure Security Benchmark (ASB)
Multiple choice
Item 9. Hardening options for mobile devices must include the following requirements except?
Establish minimum password length
Require data encryption on devices
Safely enable jail broken devices
Multiple choice
Item 10. Which solution should be used to capture and parse network traffic by using Windows events
directly from your Domain Controllers?
Microsoft Defender for Cloud
Microsoft Defender for Identity (MDI)
Microsoft Sentinel
234
Multiple choice
Item 11. You are planning a remote access strategy that needs to allow remote workers to connect via RDP
and SSH directly from the Azure portal. Which solution should you use?
Azure Bastion
Point-to-Site (P2S) VPN
Site-to-Site (S2S) VPN
Multiple choice
Item 12. Security baselines for Azure focus on cloud-centric control areas. Each recommendation includes a
series of information organized in different fields. Which field provides the rationale for the recommendation
and links to show how to implement it?
Responsibility
Azure ID
Guidance
Multiple choice
Item 13. Which capability helps to track the security posture progress overtime in a Microsoft 365 environ-
ment?
Baseline
Compliance report
Microsoft Secure Score
Multiple choice
Item 14. Which role is responsible for establishing the following security requirements for an IoT environ-
ment? 1) Scope hardware to minimum requirements, 2) Make hardware tamper proof, 3) Make upgrades
secure.
IoT hardware manufacturer/integrator
IoT solution operator
IoT solution deployer
Multiple choice
Item 15. During this process of better understanding your data, you need to execute a series of tasks that are
assigned to different owners. Who owns the task to determine data classification levels?
Data security architect
Data security engineer
System administrator
[explanation]
The data security architect is responsible for determining data classification levels. The data security
235
Multiple choice
Item 16. Which tool should be used to manage the security posture of Azure App Service workloads?
Microsoft Sentinel
Microsoft 365
Microsoft Defender for Cloud
236
Answers
Multiple choice
Item 1. How can Tailwind Traders reference Microsoft Zero Trust Architecture?
Develop security requirements based on the organizational financial goals.
■■ Identify the integration points for architecture using Microsoft Cybersecurity Reference Architecture
(MCRA).
Provide familiar security tools and significantly enhanced levels of network security.
Explanation
Using the Microsoft Cybersecurity Reference Architecture (MCRA) is key to implementing a Zero Trust
architecture.
Multiple choice
Item 2. Security helps create assurances for a business based on three major elements. Which one isn't
part of this list?
Confidentiality
Availability
■■ Redundancy
Explanation
Redundancy isn't a separate element, is actually part of availability.
Multiple choice
Item 3. A security strategy must enable defined business outcomes while:
■■ Reducing risk to an acceptable level and enable employees to be productive.
Reducing risk to zero and enable employees to be productive.
Reducing risk to an acceptable level and enable partners.
Explanation
The security strategy must enable defined business outcomes, reduce risk to an acceptable level, and enable
employees to be productive.
Multiple choice
Item 4. Which one of the options below isn't a key security strategy principle?
Productivity and security
Shared responsibility
■■ Reduce compromise
Explanation
Reduce compromise isn't a key security strategy principle. Shared responsibility as well as Productivity and
security are actually key security strategy principles.
237
Multiple choice
Item 5. Microsoft has built capabilities and resources to help accelerate your implementation of this
security guidance on Microsoft Azure. Which tool is responsible for continuous assessment of the
workloads and provides security visibility via Secure Score?
Azure Security Benchmark
■■ Microsoft Defender for Cloud
Microsoft Sentinel
Explanation
Defender for Cloud performs continuous assessment, and it has the Secure Score capability built-in.
Multiple choice
Item 6. Security management strategy is composed by some imperative principles. Given the following
definition, which principle does it relate to? "Elevate security through built-in intelligence and recommen-
dations".
Visibility
Control
■■ Guidance
Explanation
Guidance is used to elevate security through built-in intelligence and recommendations.
Multiple choice
Item 7. When selecting the appropriate baseline to use, which tool should you use to analyze, test, edit,
and store Microsoft-recommended security configuration baselines for Windows?
Group Policy
■■ Security Compliance Toolkit (SCT)
Azure Security Benchmark (ASB)
Explanation
SCT is used to analyze, test, edit, and store Microsoft-recommended security configuration baselines for
Windows.
Multiple choice
Item 8. Which tool should you use if you need to provide guidance for OS hardening and security
baseline for Windows and Linux?
Group Policy
Security Compliance Toolkit (SCT)
■■ Azure Security Benchmark (ASB)
Explanation
ASB can be used to provide guidance for OS hardening and security baseline for Windows and Linux.
238
Multiple choice
Item 9. Hardening options for mobile devices must include the following requirements except?
Establish minimum password length
Require data encryption on devices
■■ Safely enable jail broken devices
Explanation
Jail broken devices should be prohibited.
Multiple choice
Item 10. Which solution should be used to capture and parse network traffic by using Windows events
directly from your Domain Controllers?
Microsoft Defender for Cloud
■■ Microsoft Defender for Identity (MDI)
Microsoft Sentinel
Explanation
MDI captures and parses network traffic by using Windows events directly from your Domain Controllers.
Multiple choice
Item 11. You are planning a remote access strategy that needs to allow remote workers to connect via
RDP and SSH directly from the Azure portal. Which solution should you use?
■■ Azure Bastion
Point-to-Site (P2S) VPN
Site-to-Site (S2S) VPN
Explanation
Azure Bastion allows remote workers to connect via RDP and SSH directly from the Azure portal.
Multiple choice
Item 12. Security baselines for Azure focus on cloud-centric control areas. Each recommendation includes
a series of information organized in different fields. Which field provides the rationale for the recommen-
dation and links to show how to implement it?
Responsibility
Azure ID
■■ Guidance
Explanation
Guidance contains the rationale for the recommendation. Responsibility describes who is responsible for
implementing the control and Azure ID describes the Azure Security Benchmark ID that corresponds to the
recommendation.
239
Multiple choice
Item 13. Which capability helps to track the security posture progress overtime in a Microsoft 365
environment?
Baseline
Compliance report
■■ Microsoft Secure Score
Explanation
Secure Score helps to track the security posture progress of your SaaS environment.
Multiple choice
Item 14. Which role is responsible for establishing the following security requirements for an IoT environ-
ment? 1) Scope hardware to minimum requirements, 2) Make hardware tamper proof, 3) Make upgrades
secure.
■■ IoT hardware manufacturer/integrator
IoT solution operator
IoT solution deployer
Explanation
IoT hardware manufacturer/integration is responsible for these tasks. The IoT solution operator is responsi-
ble for keeping the system up-to-date. The IoT solution deployer is responsible for deploying hardware
securely.
Multiple choice
Item 15. During this process of better understanding your data, you need to execute a series of tasks that
are assigned to different owners. Who owns the task to determine data classification levels?
■■ Data security architect
Data security engineer
System administrator
[explanation]
The data security architect is responsible for determining data classification levels. The data security
engineer is responsible for discovering and classifying sensitive data.
[explanation]
Multiple choice
Item 16. Which tool should be used to manage the security posture of Azure App Service workloads?
Microsoft Sentinel
Microsoft 365
■■ Microsoft Defender for Cloud
Explanation
Microsoft Defender for Cloud is a cloud security posture management solution. Microsoft Sentinel is a SIEM
Solution. Microsoft 365 is a SaaS productivity solution.
Module 4 Design a strategy for data and ap-
plications
Prerequisites
●● Conceptual knowledge of application threat modeling, requirements,
zero trust architecture, and management of hybrid environments.
●● Working experience with application security strategies and
developing security requirements based on business goals.
Category Description
Spoofing Involves illegally accessing and then using another
user's authentication information, such as user-
name and password
Tampering Involves the malicious modification of data.
Examples include unauthorized changes made to
persistent data, such as that held in a database
and the alteration of data as it flows between two
computers over an open network, such as the
Internet
Repudiation Associated with users who deny performing an
action without other parties having any way to
prove otherwise for example, a user performs an
illegal operation in a system that lacks the ability
to trace the prohibited operations. Non-Repudia-
tion refers to the ability of a system to counter
repudiation threats. For example, a user who
purchases an item might have to sign for the item
upon receipt. The vendor can then use the signed
receipt as evidence that the user did receive the
package
1 https://docs.microsoft.com/azure/security/develop/threat-modeling-tool-threats
243
Category Description
Information Disclosure Involves the exposure of information to individuals
who are not supposed to have access to it for
example, the ability of users to read a file that they
were not granted access to, or the ability of an
intruder to read data in transit between two
computers
Denial of Service Denial of service (DoS) attacks deny service to
valid users for example, by making a Web server
temporarily unavailable or unusable. You must
protect against certain types of DoS threats simply
to improve system availability and reliability
Elevation of Privilege An unprivileged user gains privileged access and
thereby has sufficient access to compromise or
destroy the entire system. Elevation of privilege
threats include those situations in which an
attacker has effectively penetrated all system
defenses and become part of the trusted system
itself, a dangerous situation indeed
Microsoft Security Development Lifecycle uses STRIDE and provides a tool
to assist with this process. This tool is available at no additional
cost. For more information, see Microsoft Threat Modeling
Tool2.
●● Open Web Application Security Project
(OWASP)3 has
documented a threat modeling approach for applications.
Integrate threat modeling through automation using secure operations.
Here are some resources:
●● Toolkit for Secure DevOps on
Azure4.
●● Guidance on DevOps pipeline
security5 by
OWASP.
2 https://www.microsoft.com/securityengineering/sdl/threatmodeling
3 https://owasp.org/www-community/Threat_Modeling_Process
4 https://azsk.azurewebsites.net/
5 https://www.owasp.org/index.php/OWASP_AppSec_Pipeline#tab=Main
244
Mitigation categories
The Threat Modeling Tool mitigations are categorized according to the
Web Application Security Frame, which consists of the following:
Category Description
Auditing and Logging Who did what and when? Auditing and logging
refer to how your application records security-re-
lated events
Authentication Who are you? Authentication is the process where
an entity proves the identity of another entity,
typically through credentials, such as a user name
and password
Authorization What can you do? Authorization is how your
application provides access controls for resources
and operations
Communication Security Who are you talking to? Communication Security
ensures all communication done is as secure as
possible
Configuration Management Who does your application run as? Which data-
bases does it connect to? How is your application
administered? How are these settings secured?
Configuration management refers to how your
application handles these operational issues
245
Category Description
Cryptography How are you keeping secrets (confidentiality)?
How are you tamper-proofing your data or
libraries (integrity)? How are you providing seeds
for random values that must be cryptographically
strong? Cryptography refers to how your applica-
tion enforces confidentiality and integrity
Exception Management When a method call in your application fails, what
does your application do? How much do you
reveal? Do you return friendly error information to
end users? Do you pass valuable exception
information back to the caller? Does your applica-
tion fail gracefully?
Input Validation How do you know that the input your application
receives is valid and safe? Input validation refers to
how your application filters, scrubs, or rejects input
before additional processing. Consider constrain-
ing input through entry points and encoding
output through exit points. Do you trust data from
sources such as databases and file shares?
Sensitive Data How does your application handle sensitive data?
Sensitive data refers to how your application
handles any data that must be protected either in
memory, over the network, or in persistent stores
Session Management How does your application handle and protect
user sessions? A session refers to a series of
related interactions between a user and your Web
application
Phase Activities
Plan DevOps teams ideate, define and describe features
and capabilities of the applications and systems
they're building. They track progress at low and
high levels of granularity from single-product
tasks to tasks that span portfolios of multiple
products. Some of the ways DevOps teams plan
with agility and visibility are creating backlogs,
tracking bugs, managing agile software develop-
ment with Scrum, using Kanban boards, and
visualizing progress with dashboards.
248
Phase Activities
Develop Includes all aspects of coding writing, testing,
reviewing, and integrating code by team members
as well as building that code into build artifacts
that can be deployed into various environments.
Teams use version control, usually Git, to collabo-
rate on code and work in parallel. They also seek
to innovate rapidly without sacrificing quality,
stability, and productivity. To do that, they use
highly productive tools, automate mundane and
manual steps, and iterate in small increments
through automated testing and continuous
integration
Deliver The process of deploying applications into
production environments consistently and reliably,
ideally via continuous delivery. The deliver phase
also includes deploying and configuring the fully
governed foundational Infrastructure that makes
up those environments. These environments often
use technologies like Infrastructure as Code (IaC),
containers, and microservices.
Operate Involves maintaining, monitoring, and trouble-
shooting applications in production environments,
usually hosted in public and hybrid clouds. In
adopting DevOps practices, teams work to ensure
system reliability, high availability and aim for zero
downtime while reinforcing security and govern-
ance.
Modern cloud platforms like Azure can host both legacy and modern
generations of applications
●● Legacy–applications are hosted on Infrastructure as a Service
(IaaS) virtual machines that typically include all dependencies,
including OS, middleware, and other components.
250
6 https://docs.microsoft.com/azure/active-directory/
7 https://docs.microsoft.com/azure/active-directory/b2b/
8 https://docs.microsoft.com/azure/active-directory-b2c/
253
●● Key management–Ideally, use identity for authentication rather than directly handling keys (see
Prefer Identity Authentication over Keys9). For situations where accessing services that require
access to keys, use a key management service like Azure Key Vault10 or AWS Key Management
Service11. This will help you manage and secure these keys rather than attempting to safely handle
keys in application code. You can use CredScan12 to discover potentially exposed keys in your applica-
tion code.
●● Application Configurations - Inconsistent configurations for
applications can create security Risks. Azure App Configuration
provides a service to centrally manage application settings and
feature flags, which helps mitigate this risk.
Additional information
For additional information on Security Standards for applications, see the following:
●● Best Practices for Application Registration13
●● Threat Modeling14
●● OWASP ASVS15
●● STRIDE16
●● NIST SSDF17
●● Microsoft Secure DevOps using Azure18
Exercise
Meet Tailwind Traders
9 https://docs.microsoft.com/security/compass/applications-services#prefer-identity-authentication-over-keys
10 https://docs.microsoft.com/azure/key-vault/
11 https://aws.amazon.com/kms/
12 https://secdevtools.azurewebsites.net/helpcredscan.html
13 https://docs.microsoft.com/azure/active-directory/develop/security-best-practices-for-app-registration
14 https://docs.microsoft.com/azure/security/develop/threat-modeling-tool
15 https://owasp.org/www-project-application-security-verification-standard/
16 https://docs.microsoft.com/azure/security/develop/threat-modeling-tool-threats
17 https://csrc.nist.gov/publications/detail/sp/800-218/final
18 https://azsk.azurewebsites.net/
254
Requirements
Tailwind Traders is planning on making some significant changes to their
Application Security Strategy. Currently, they're using the Waterfall
development cycle to manage all applications. They have asked for your
assistance with recommendations and questions. Here are the specific
requirements.
●● Security in DevOps. The company has a new security optimization
project for customer environments. The CISO wants to ensure that all
available Applications are secured and controlled in the cloud.
Tasks
Evaluate an Application Security Standard
●● What could Tailwind Traders do to increase the organization's
ability to rapidly address security concerns without waiting for
a longer planning and testing cycle of a waterfall model?
●● Evaluate a standard and explain your decision-making process.
●● Tailwind Traders should shift from a ‘Waterfall’ development cycle to a DevOps lifecycle of continuous
integration, continuous delivery (CI/CD) for applications, and API development as quickly as possible.
●● What security strategy components could Tailwind Traders use to mitigate breaches for new applica-
tions deployed in Azure?
●● Tailwind Traders should enforce Threat Modeling, Code Reviews, Security Testing and optimize their
Security
Development Lifecycle (SDL) for new applications.
How are you enforcing Application Security for all users to protect
their identity, data, and other assets in Microsoft Azure?
Summary
In this module, you've learned how to build an overall application
security strategy. You have learned different strategies for designing,
defining, and recommending an organizational application security
strategy and architecture. You should now be able to:
●● Specify a security strategy for applications and APIs
●● Specify priorities for mitigating threats to applications
●● Specify a security standard for onboarding a new application
19 https://docs.microsoft.com/azure/security/develop/threat-modeling-tool-threats
20 https://docs.microsoft.com/azure/security/develop/threat-modeling-tool-mitigations
255
21 https://docs.microsoft.com/azure/architecture/framework/security/design-threat-model
22 https://docs.microsoft.com/security/benchmark/azure/baselines/app-service-security-baseline
23 https://docs.microsoft.com/security/compass/applications-services
24 https://docs.microsoft.com/devops/operate/security-in-devops
256
Prerequisites
●● Conceptual knowledge of application threat modeling, requirements,
zero trust architecture, and management of hybrid environments.
●● Working experience with application security strategies and
developing security requirements based on business goals.
Product/Service Article
Minimize access to share feature
on critical entities
Train users on the risks associat-
ed with the Dynamics CRM Share
feature and good security
practices
Include a development standards
rule proscribing showing config
details in exception management
Azure Storage Use Azure Storage Service
Encryption (SSE) for Data at Rest
(Preview)
Use Client-Side Encryption to
store sensitive data in Azure
Storage
Mobile Client Encrypt sensitive or PII data
written to phones local storage
Obfuscate generated binaries
before distributing to end users
WCF Set clientCredentialType to
Certificate or Windows
WCF-Security Mode isn't ——————–+
enabled
Ransomware Protection
Mitigating ransomware and extortion attacks is an urgent priority for
organizations because of the high impact of these attacks and high
likelihood an organization will experience one.
Ransomware is a type of extortion attack that encrypts files and
folders, preventing access to important data. Criminals use ransomware
to extort money from victims by demanding money, usually in form of
cryptocurrency, in exchange for a decryption key. Criminals also often
use ransomware to extort money from victims in exchange for not
releasing sensitive data to the dark web or the public internet.
These attacks can be catastrophic to business operations and are
difficult to clean up, requiring complete adversary eviction to protect
against future attacks. Unlike early forms of ransomware that only
required malware remediation, human-operated ransomware can continue to
threaten your business operations after the initial encounter.
attackers25 by
making it:
●● Much harder to access and disrupt systems or encrypt or damage key
organization data.
●● Easier for your organization to recover from an attack without
paying the ransom.
25 https://docs.microsoft.com/security/compass/protect-against-ransomware-phase1
26 https://docs.microsoft.com/security/compass/protect-against-ransomware-phase2
27 https://docs.microsoft.com/security/compass/protect-against-ransomware-phase3
28 https://download.microsoft.com/download/7/5/1/751682ca-5aae-405b-afa0-e4832138e436/RansomwareRecommendations.pptx
261
29 https://docs.microsoft.com/defender-cloud-apps/best-practices
30 https://docs.microsoft.com/defender-cloud-apps/tutorial-flow
31 https://docs.microsoft.com/defender-cloud-apps/tutorial-cloud-platform-security
32 https://docs.microsoft.com/security/compass/protect-against-ransomware
262
The basic strategy for data identification and protection relies on the
following elements - depending on which product you use, there may be a
greater emphasis on certain concepts:
1. Data discovery - create an inventory of all of the data stores and
knowledge bases within your organization.
2. Data classification - define what counts as sensitive for your
organization.
3. Data protection – define policies to control access to and sharing
of data. To apply flexible protection actions that include
encryption, access restrictions, and visual markings
4. Usage monitoring – reporting and auditing on data access activity
and policy violations.
5. Data loss prevention - To help prevent accidental oversharing of
sensitive information
Data classification
Classification is the process of identifying and labeling content in
your organization to get a better understanding of your data landscape.
This is accomplished by applying one or more of the following to your
data:
●● Encryption
●● Access control
●● Data destruction
●● Data loss prevention
●● Public disclosure
●● Logging and tracking access
●● Other control objectives, as needed
Data Protection
The data protection component essentially acts as an enforcement point
where the policies regarding access to and sharing of different types of
sensitive information are applied to the data that has been discovered
across the data estate.
33 https://docs.microsoft.com/defender-cloud-apps/file-filters
268
Use an app connector Microsoft app connectors use the APIs supplied by
app providers. They provide greater visibility into
and control over the apps used in your organiza-
tion. Scans are performed periodically (every 12
hours) and in real time (triggered each time a
change is detected). For more information and
instructions on how to add apps, see Connecting
apps.
Use Conditional Access App Control Conditional Access App Control solution uses a
reverse proxy architecture that is uniquely inte-
grated with Azure Active Directory (AD) Condition-
al Access. Once configured in Azure AD, users will
be routed to Defender for Cloud Apps where
access and session policies are enforced to protect
the data apps attempt to use. This connection
method allows you to apply controls to any app.
For more information, see Protect apps with
Defender for Cloud Apps Conditional Access App
Control.
Example scenarios:
- Manage sensitivity labels for
Office apps
- Encrypt documents and emails
- Apply and view labels in Power
BI
34 https://docs.microsoft.com/defender-cloud-apps/daily-activities-to-protect-your-cloud-environment#check-the-dashboard
35 https://docs.microsoft.com/defender-cloud-apps/investigate
271
Best Practices
More information about alert policies and searching the audit log:
●● Turn audit log search on or off36
●● Search the audit log37
●● Search-UnifiedAuditLog38 (cmdlet)
●● Detailed properties in the audit log39
36 https://docs.microsoft.com/microsoft-365/compliance/turn-audit-log-search-on-or-off?view=o365-worldwide&preserve-view=true
37 https://docs.microsoft.com/microsoft-365/compliance/search-the-audit-log-in-security-and-compliance?view=o365-worldwide&preserve-
view=true
38 https://docs.microsoft.com/powershell/module/exchange/search-unifiedauditlog
39 https://docs.microsoft.com/microsoft-365/compliance/detailed-properties-in-the-office-365-audit-log?view=o365-worldwide&preserve-
view=true
274
40 https://docs.microsoft.com/cloud-app-security/manage-admins#office-365-and-azure-ad-roles-with-access-to-cloud-app-security
41 https://docs.microsoft.com/cloud-app-security/cas-compliance-trust#encryption
42 https://docs.microsoft.com/azure/security/fundamentals/encryption-overview#encryption-of-data-in-transit
43 https://docs.microsoft.com/security/engineering/solving-tls1-problem
44 https://docs.microsoft.com/azure/security/fundamentals/double-encryption#data-in-transit
275
45 https://docs.microsoft.com/cloud-app-security/cas-compliance-trust#encryption
46 https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest#encryption-at-rest-in-microsoft-cloud-services
47 https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest
48 https://docs.microsoft.com/defender-cloud-apps/tutorial-dlp
49 https://docs.microsoft.com/defender-cloud-apps/use-case-information-protection
50 https://docs.microsoft.com/defender-cloud-apps/use-case-admin-quarantine
51 https://docs.microsoft.com/azure/purview/overview
52 https://docs.microsoft.com/microsoft-365/compliance/sensitive-information-type-entity-definitions?view=o365-worldwide&preserve-
view=true
276
53 https://docs.microsoft.com/azure/azure-sql/database/sql-database-paas-overview
54 https://docs.microsoft.com/azure/cosmos-db/database-encryption-at-rest
277
●● SMB 3.0, which used to access Azure Files shares, supports encryption, and it's available in Win-
dows Server 2012 R2, Windows 8, Windows 8.1, and Windows 10. It allows cross-region access and
even access on the desktop.
●● Client-side encryption encrypts the data before it's sent to your Azure Storage instance, so that it's
encrypted as it travels across the network.
●● SMB encryption over Azure virtual networks - By using SMB 3.0 in VMs that are running Windows
Server 2012 or later, you can make data transfers secure by encrypting data in transit over Azure
Virtual Networks. By encrypting data, you help protect against tampering and eavesdropping attacks.
Administrators can enable SMB encryption for the entire server, or just specific shares.
●● By default, after SMB encryption is turned on for a share or server, only SMB 3.0 clients are allowed
to access the encrypted shares.
●● Point-to-site VPNs - Point-to-site VPNs allow individual client computers access to an Azure virtual
network. The Secure Socket Tunneling Protocol (SSTP) is used to create the VPN tunnel. It can traverse
firewalls (the tunnel appears as an HTTPS connection). You can use your own internal public key
infrastructure (PKI) root certificate authority (CA) for point-to-site connectivity.
278
●● Site-to-site VPNs -You can use a site-to-site VPN gateway connection to connect your on-premises
network to an Azure virtual network over an IPsec/IKE (IKEv1 or IKEv2) VPN tunnel. This type of
connection requires an on-premises VPN device that has an external-facing public IP address assigned
to it.
55 https://docs.microsoft.com/azure/role-based-access-control/built-in-roles
56 https://docs.microsoft.com/azure/role-based-access-control/custom-roles
57 https://docs.microsoft.com/archive/blogs/kv/updated-deploy-certificates-to-vms-from-customer-managed-key-vault
279
58 https://4sysops.com/archives/understand-the-microsoft-privileged-access-workstation-paw-security-model/
59 https://docs.microsoft.com/azure/security/fundamentals/azure-disk-encryption-vms-vmss
60 https://docs.microsoft.com/azure/security/fundamentals/encryption-atrest#azure-resource-providers-encryption-model-support
280
61 https://docs.microsoft.com/azure/vpn-gateway/tutorial-site-to-site-portal
62 https://docs.microsoft.com/azure/vpn-gateway/vpn-gateway-howto-point-to-site-classic-azure-portal
63 https://docs.microsoft.com/azure/expressroute/expressroute-introduction
64 https://docs.microsoft.com/rest/api/storageservices/
65 https://azure.microsoft.com/services/storage/
281
Exercise
Meet Tailwind Traders
Requirements
Tailwind Traders plans to make some significant changes to their Data
Security Strategy. Currently, they're using the Waterfall development
cycle to manage all applications. They have asked for your assistance
with recommendations and questions. Here are the specific requirements.
●● Data Security. The company has a new security optimization
project for customer environments. The CISO wants to ensure that all
data in rest and transit are secured and controlled in the cloud.
Tasks
Evaluate a Data Security Strategy
●● What could Tailwind Traders evaluate to design a Data Security Strategy?
66 https://docs.microsoft.com/azure/security/fundamentals/encryption-overview
67 https://docs.microsoft.com/azure/security/fundamentals/data-encryption-best-practices
68 https://docs.microsoft.com/defender-cloud-apps/use-case-proxy-block-session-aad
282
Summary
In this module, you've learned how to build an overall data security
strategy. You have learned different strategies for designing, defining,
and recommending an organizational application security strategy and
architecture. You should now be able to:
●● Prioritize mitigating threats to data
●● Design a strategy to identify and protect sensitive data
●● Specify an encryption standard for data at rest and in motion
69 https://docs.microsoft.com/defender-cloud-apps/best-practices
70 https://docs.microsoft.com/defender-cloud-apps/tutorial-dlp
71 https://docs.microsoft.com/defender-cloud-apps/tutorial-proxy
72 https://docs.microsoft.com/azure/security/fundamentals/data-encryption-best-practices
283
Knowledge check
Check your knowledge
Multiple choice
Item 1. How can Tailwind Traders enforce security assurance for new applications in their Azure environ-
ment?
Securing an application requires security assurances for three different component types: application
code, application services, and application hosting platform.
Use identity for authentication rather than directly handling keys.
Always authenticate with identity services rather than cryptographic keys when available.
Multiple choice
Item 2. What security standard or model can Tailwind Traders use to secure modern applications?
STRIDE
NIST SP 800-63-1
ISO 27001
Multiple choice
Item 3. What can Tailwind Traders do to ensure the organization's data is encrypted to protect against
compromises of any layer of encryption?
Use Azure encryption services to enforce double encryption to provide two or more independent
layers of encryption to protect against compromises.
Detect activity from unexpected locations or countries.
Identify and control sensitive information (DLP); respond to sensitivity labels on content.
Multiple choice
Item 4. How can Tailwind Traders discover and manage Shadow IT in their network?
Monitor user activities for anomalies, protect data when it is exfiltrated, and prevent unprotected data
from uploading to apps.
Encrypt sensitive information in transit.
Create a block download policy for unmanaged devices.
Multiple choice
Item 5. What can Tailwind Traders do to classify sensitive information in the Azure environment?
Define which information is sensitive by using Microsoft Information Protection.
Tune anomaly policies set IP ranges, and send feedback for alerts.
Ensure that sensitive data relevant to Web APIs isn't stored in the browser's storage.
284
Answers
Multiple choice
Item 1. How can Tailwind Traders enforce security assurance for new applications in their Azure environ-
ment?
■■ Securing an application requires security assurances for three different component types: application
code, application services, and application hosting platform.
Use identity for authentication rather than directly handling keys.
Always authenticate with identity services rather than cryptographic keys when available.
Explanation
Application security assurance includes code, services and the hosting platform. The decision about how to
do authentication is a more fundamental decision that should be prioritized before onboarding new
applications.
Multiple choice
Item 2. What security standard or model can Tailwind Traders use to secure modern applications?
■■ STRIDE
NIST SP 800-63-1
ISO 27001
Explanation
STRIDE is a model for identifying computer security threats in six different categories. NIST SP 800-63-1
offers general guidelines on electronic authentication, but doesn't specifically address securing modern
applications. ISO 27001 provides general guidance on securing information systems, but is not the best
choice for specific guidance on securing modern applications.
Multiple choice
Item 3. What can Tailwind Traders do to ensure the organization's data is encrypted to protect against
compromises of any layer of encryption?
■■ Use Azure encryption services to enforce double encryption to provide two or more independent
layers of encryption to protect against compromises.
Detect activity from unexpected locations or countries.
Identify and control sensitive information (DLP); respond to sensitivity labels on content.
Explanation
Double encryption is the correct approach. The other strategies allow you to prioritize cloud threats and
identify and protect sensitive data.
285
Multiple choice
Item 4. How can Tailwind Traders discover and manage Shadow IT in their network?
■■ Monitor user activities for anomalies, protect data when it is exfiltrated, and prevent unprotected data
from uploading to apps.
Encrypt sensitive information in transit.
Create a block download policy for unmanaged devices.
Explanation
Managing shadow IT includes monitoring user activy, protecting against data exfiltration and preventing
unprotected data from being uploaded elsewhere.
Multiple choice
Item 5. What can Tailwind Traders do to classify sensitive information in the Azure environment?
■■ Define which information is sensitive by using Microsoft Information Protection.
Tune anomaly policies set IP ranges, and send feedback for alerts.
Ensure that sensitive data relevant to Web APIs isn't stored in the browser's storage.
Explanation
Defining sensitive information with Microsoft Information Protection is key to classifying sensitive informa-
tion in Azure. Tuning anomaly policies will help with prioritizing cloud threats. Preventing Web API data
from being stored in the browsers cache will help mitigate threats to data.