Skip to content

Commit 13f0594

Browse files
committed
consistency fixes
1 parent 2f74e7b commit 13f0594

File tree

4 files changed

+8
-8
lines changed

4 files changed

+8
-8
lines changed

articles/active-directory/standards/memo-22-09-enterprise-wide-identity-management-system.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -59,7 +59,7 @@ Classify assets in terms of:
5959
- The sensitivity of data that they contain.
6060
- Laws and regulations that establish specific requirements for confidentiality, integrity, or availability of data/information in each major system and that apply to the system's information protection requirements.
6161

62-
As a part of your application inventory, you need to determine if your current applications use cloud-ready or [legacy authentication protocols](../fundamentals/auth-sync-overview.md):
62+
As a part of your application inventory, you need to determine if your current applications use cloud-ready protocols or [legacy authentication protocols](../fundamentals/auth-sync-overview.md):
6363

6464
* Cloud-ready applications support modern protocols for authentication, such as SAML, WS-Federation/Trust, OpenID Connect (OIDC), and OAuth 2.0.
6565

@@ -95,7 +95,7 @@ For apps that use legacy authentication protocols, consider the following:
9595

9696
* [Use Azure AD Application Proxy or secure hybrid partner access](../manage-apps/secure-hybrid-access.md) to provide secure access.
9797

98-
* Decommission access to apps that are no longer needed or that aren't supported (for example, apps added by shadow IT processes).
98+
* Decommission access to apps that are no longer needed or that aren't supported (for example, apps that shadow IT processes added).
9999

100100
## Connecting devices
101101

@@ -123,7 +123,7 @@ Devices integrated with Azure AD can be either [hybrid joined devices](../device
123123

124124
## Next steps
125125

126-
The following articles are a part of this documentation set:
126+
The following articles are part of this documentation set:
127127

128128
[Meet identity requirements of memorandum M-22-09](memo-22-09-meet-identity-requirements.md)
129129

articles/active-directory/standards/memo-22-09-meet-identity-requirements.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,9 +21,9 @@ US executive order [14028, Improving the Nation's Cyber Security](https://www.wh
2121

2222
This series of articles offers guidance for employing Azure Active Directory (Azure AD) as a centralized identity management system for implementing Zero Trust principles, as described in memorandum M-22-09.
2323

24-
The release of memorandum M-22-09 is designed to support Zero Trust initiatives within federal agencies. It also provides regulatory guidance in supporting federal cybersecurity and data privacy paws. The memo cites the [Department of Defense (DoD) Zero Trust Reference Architecture](https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf),
24+
The release of memorandum M-22-09 is designed to support Zero Trust initiatives within federal agencies. It also provides regulatory guidance in supporting federal cybersecurity and data privacy paws. The memo cites the [Department of Defense (DoD) Zero Trust Reference Architecture](https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v1.1(U)_Mar21.pdf):
2525

26-
"The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once at the perimeter to continual verification of each user, device, application, and transaction."
26+
>"The foundational tenet of the Zero Trust Model is that no actor, system, network, or service operating outside or within the security perimeter is trusted. Instead, we must verify anything and everything attempting to establish access. It is a dramatic paradigm shift in philosophy of how we secure our infrastructure, networks, and data, from verify once at the perimeter to continual verification of each user, device, application, and transaction."
2727
2828
The memo identifies five core goals that federal agencies must reach. These goals are organized through the Cybersecurity Information Systems Architecture (CISA) Maturity Model. CISA's Zero Trust model describes five complementary areas of effort, or pillars: identity, devices, networks, applications and workloads, and data. These themes cut across these areas: visibility and analytics, automation and orchestration, and governance.
2929

@@ -48,7 +48,7 @@ The article series features guidance that encompasses existing agency investment
4848

4949
## Next steps
5050

51-
The following articles are a part of this documentation set:
51+
The following articles are part of this documentation set:
5252

5353
[Enterprise-wide identity management systems](memo-22-09-enterprise-wide-identity-management-system.md)
5454

articles/active-directory/standards/memo-22-09-multi-factor-authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,7 @@ While the memo isn't specific on which policies to use with passwords, consider
106106

107107
## Next steps
108108

109-
The following articles are a part of this documentation set:
109+
The following articles are part of this documentation set:
110110

111111
[Meet identity requirements of memorandum M-22-09](memo-22-09-meet-identity-requirements.md)
112112

articles/active-directory/standards/memo-22-09-other-areas-zero-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,7 @@ After you understand operational governance, you can use [governance features](.
9090

9191
## Next steps
9292

93-
The following articles are a part of this documentation set:
93+
The following articles are part of this documentation set:
9494

9595
[Meet identity requirements of memorandum M-22-09](memo-22-09-meet-identity-requirements.md)
9696

0 commit comments

Comments
 (0)