|
4 | 4 | href: introduction.md
|
5 | 5 | - name: Security Controls
|
6 | 6 | items:
|
7 |
| - - name: Overview of Azure Security Controls |
| 7 | + - name: Overview of Azure security controls |
8 | 8 | href: overview.md
|
9 |
| - - name: Network Security |
| 9 | + - name: Network security |
10 | 10 | href: security-control-network-security.md
|
11 |
| - - name: Logging and Monitoring |
| 11 | + - name: Logging and monitoring |
12 | 12 | href: security-control-logging-monitoring.md
|
13 |
| - - name: Identity and Access Control |
| 13 | + - name: Identity and access control |
14 | 14 | href: security-control-identity-access-control.md
|
15 |
| - - name: Data Protection |
| 15 | + - name: Data protection |
16 | 16 | href: security-control-data-protection.md
|
17 |
| - - name: Vulnerability Management |
| 17 | + - name: Vulnerability management |
18 | 18 | href: security-control-vulnerability-management.md
|
19 |
| - - name: Inventory and Asset Management |
| 19 | + - name: Inventory and asset management |
20 | 20 | href: security-control-inventory-asset-management.md
|
21 |
| - - name: Secure Configuration |
| 21 | + - name: Secure configuration |
22 | 22 | href: security-control-secure-configuration.md
|
23 |
| - - name: Malware Defense |
| 23 | + - name: Malware defense |
24 | 24 | href: security-control-malware-defense.md
|
25 |
| - - name: Data Recovery |
| 25 | + - name: Data recovery |
26 | 26 | href: security-control-data-recovery.md
|
27 |
| - - name: Incident Response |
| 27 | + - name: Incident response |
28 | 28 | href: security-control-incident-response.md
|
29 |
| - - name: Penetration Tests and Red Team Exercises |
| 29 | + - name: Penetration tests and red team exercises |
30 | 30 | href: security-control-penetration-tests-red-team-exercises.md
|
31 | 31 | - name: Security Baselines
|
32 | 32 | items:
|
|
0 commit comments