Skip to content

Commit cd3fe85

Browse files
authored
Merge pull request #7979 from MicrosoftDocs/users/chcomley/security-overview-fix
Quick minor fix for security overview
2 parents 9910fe3 + b2d4a6b commit cd3fe85

File tree

1 file changed

+4
-5
lines changed

1 file changed

+4
-5
lines changed

docs/organizations/security/security-overview.md

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: azure-devops-security
77
ms.author: chcomley
88
author: chcomley
99
monikerRange: '<= azure-devops'
10-
ms.date: 04/23/2025
10+
ms.date: 05/28/2025
1111
---
1212

1313
# Make your Azure DevOps secure
@@ -28,17 +28,16 @@ Securing your network is crucial when you're working with Azure DevOps to protec
2828
- **[Use Azure Firewall](/azure/firewall/overview):** Deploy Azure Firewall to provide a centralized network security policy across multiple Azure subscriptions and virtual networks.
2929
- **[Monitor network traffic with Azure Network Watcher](/azure/network-watcher/network-watcher-monitoring-overview):** Use Azure Network Watcher to monitor and diagnose network issues, ensuring the security and performance of your network.
3030
- **[Implement DDoS protection with Azure DDoS Protection](/azure/ddos-protection/ddos-protection-overview):** Enable Azure DDoS Protection to safeguard your applications from distributed denial-of-service (DDoS) attacks.
31-
- **[Protect your data]:** Protect your data by using encryption, backup, and recovery strategies.
3231

3332
For more information, see [Application management best practices](/azure/active-directory/manage-apps/application-management-fundamentals).
3433

3534
## Implement Zero Trust
3635

3736
Adopt [Zero Trust](/azure/security/fundamentals/zero-trust) principles across your DevOps processes to make sure every access request is thoroughly verified, regardless of its origin. Zero Trust operates on the principle of "never trust, always verify," meaning that no entity, whether inside or outside the network, is trusted by default. By implementing Zero Trust, you can significantly reduce the risk of security breaches and ensure that only authorized users and devices can access your resources.
3837

39-
- Fortify your [DevOps platform](/security/zero-trust/develop/secure-devops-platform-environment-zero-trust),
40-
- Safeguard your [development environment](/security/zero-trust/develop/secure-dev-environment-zero-trust),
41-
- Integrate Zero Trust seamlessly into your [developer workflows](/security/zero-trust/develop/embed-zero-trust-dev-workflow).
38+
- Fortify your [DevOps platform](/security/zero-trust/develop/secure-devops-platform-environment-zero-trust)
39+
- Safeguard your [development environment](/security/zero-trust/develop/secure-dev-environment-zero-trust)
40+
- Integrate Zero Trust seamlessly into your [developer workflows](/security/zero-trust/develop/embed-zero-trust-dev-workflow)
4241

4342
Zero Trust helps to protect against lateral movement within the network, ensuring that even if there's a compromised part of the network, the threat is contained and can't spread. For more information, see the [Zero Trust Assessment guide](https://microsoft.github.io/zerotrustassessment/guide).
4443

0 commit comments

Comments
 (0)