@@ -46,7 +46,7 @@ highlightedContent:
46
46
47
47
conceptualContent :
48
48
items :
49
- - title : " Modernize security operations: Learn the fundamentals of Azure security and how to defend against threats "
49
+ - title : Modernize security operations
50
50
links :
51
51
- url : ./fundamentals/overview.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
52
52
itemType : overview
@@ -58,7 +58,7 @@ conceptualContent:
58
58
itemType : concept
59
59
text : Protect against ransomware
60
60
61
- - title : " Data security & governance, risk, and compliance: If your organization needs to comply with legal or regulatory standards, learn about compliance in Azure "
61
+ - title : Data security & governance, risk, and compliance
62
62
links :
63
63
- url : https://docs.microsoft.com/learn/modules/m365-compliance-information-governance/
64
64
itemType : overview
@@ -70,7 +70,7 @@ conceptualContent:
70
70
itemType : concept
71
71
text : Deploy an information protection solution with Microsoft Purview
72
72
73
- - title : " Secure identities and access: Learn how identity and access management offers security assurances "
73
+ - title : Secure identities and access
74
74
links :
75
75
- url : https://docs.microsoft.com/security/zero-trust/deploy/identity
76
76
itemType : how-to-guide
@@ -80,4 +80,131 @@ conceptualContent:
80
80
text : Securing privleged access
81
81
- url : https://docs.microsoft.com/security/zero-trust/develop/identity
82
82
itemType : concept
83
- text : Building apps with a Zero Trust approach to identity
83
+ text : Building apps with a Zero Trust approach to identity
84
+
85
+ additionalContent :
86
+ sections :
87
+ - title : Additional security guidance
88
+ items :
89
+ - title : Microsoft Learn
90
+ summary : If you're new to security, build your skills with Microsoft Learn
91
+ url : https://docs.microsoft.com/learn/browse/?products=azure&roles=security-engineer%2Csecurity-operations-analyst
92
+ - title : Microsoft Cloud Adoption Framework for Azure
93
+ summary : Secure methodology designed to help cloud architects and business decision makers create and implement security strategies for the cloud
94
+ url : https://docs.microsoft.com/azure/cloud-adoption-framework/secure/
95
+ - title : Azure Well-Architected Framework
96
+ summary : Design principles for a securely architected system hosted on cloud or on-premises datacenters
97
+ url : https://docs.microsoft.com/azure/architecture/framework/security/overview
98
+ - title : Azure Architecture Center
99
+ summary : A set of guiding tenets that can be used to protect your applications and data from threats
100
+ url : https://docs.microsoft.com/azure/architecture/guide/security/security-start-here
101
+ - title : Azure Security Benchmark
102
+ summary : Best practices and recommendations to secure your cloud deployments
103
+ url : https://docs.microsoft.com/security/benchmark/azure/introduction
104
+ - title : Microsoft Security Best Practices
105
+ summary : Collection of best practices that provide clear actionable guidance for security related decisions, includes Azure and Microsoft 365
106
+ url : https://docs.microsoft.com/security/compass/compass
107
+ - title : Microsoft 365 security guidance
108
+ summary : Learn about security in Microsoft 365
109
+ url : https://docs.microsoft.com/microsoft-365/security/?view=o365-worldwide
110
+ - title : Azure security fundamentals
111
+ summary : Learn how to secure your cloud solutions on Azure
112
+ url : https://docs.microsoft.com/azure/security/journey/
113
+
114
+ - title : Security services and capabilities
115
+ items :
116
+ # Card
117
+ - title : cardtitle1
118
+ links :
119
+ - text : link1a
120
+ url : ./file1a.md OR /file1a
121
+ - text : link1b
122
+ url : ./file1b.md OR /file1b
123
+ # Card
124
+ - title : cardtitle2
125
+ links :
126
+ - text : link2a
127
+ url : ./file2a.md OR /file2a
128
+ - text : link2b
129
+ url : ./file2b.md OR /file2b
130
+ # Card
131
+ - title : cardtitle3
132
+ links :
133
+ - text : link3a
134
+ url : ./file3a.md OR /file3a
135
+ - text : link3b
136
+ url : ./file3b.md OR /file3b
137
+
138
+ - title : Security services and capabilities
139
+ items :
140
+ - title : Microsoft Sentinel
141
+ links :
142
+ - url : ../sentinel/overview.md
143
+ text : What is Microsoft Sentinel?
144
+ - url : ../sentinel/quickstart-onboard.md
145
+ text : Onboard Microsoft Sentinel
146
+ - url : https://docs.microsoft.com/en-us/learn/paths/security-ops-sentinel/
147
+ text : " Learn: Cloud-native security operations with Microsoft Sentinel"
148
+
149
+ - title : Microsoft Defender for Cloud
150
+ links :
151
+ - url : ../defender-for-cloud/defender-for-cloud-introduction.md
152
+ text : What is Microsoft Defender for Cloud?
153
+ - url : ../defender-for-cloud/tutorial-protect-resources.md
154
+ text : Protect your resources
155
+ - url : https://docs.microsoft.com/learn/modules/microsoft-cloud-app-security/
156
+ text : " Learn: Secure your cloud apps and services"
157
+
158
+ - title : Azure Key Vault
159
+ links :
160
+ - url : ../key-vault/general/overview.md
161
+ text : What is Azure Key Vault?
162
+ - url : ../key-vault/secrets/quick-create-cli.md
163
+ text : Set and retrieve a secret
164
+ - url : https://docs.microsoft.com/learn/modules/manage-secrets-with-azure-key-vault/
165
+ text : " Learn: Manage secrets in your server apps"
166
+
167
+ - title : Microsoft Defender for IoT
168
+ links :
169
+ - url : ../defender-for-iot/overview.md
170
+ text : Introducing Microsoft Defender for IoT
171
+ - url : ../defender-for-iot/getting-started.md
172
+ text : Get started with Defender for IoT
173
+ - url : https://docs.microsoft.com/learn/paths/enhance-iot-solution-security-by-using-azure-defender/
174
+ text : " Learn: Enhance IoT solution security"
175
+
176
+ - title : Azure Active Directory
177
+ links :
178
+ - url : https://docs.microsoft.com/azure/active-directory/fundamentals/active-directory-whatis
179
+ text : What is Azure Active Directory?
180
+ - url : https://docs.microsoft.com/azure/active-directory/fundamentals/security-operations-introduction
181
+ text : Security operations guide
182
+ - url : https://docs.microsoft.com/learn/modules/secure-aad-users-with-mfa/
183
+ text : " Learn: Secure Azure Active Directory users with Multi-Factor Authentication"
184
+
185
+ - title : Azure Information Protection
186
+ links :
187
+ - url : https://docs.microsoft.com/azure/information-protection/what-is-information-protection
188
+ text : What is Azure Information Protection?
189
+ - url : https://docs.microsoft.com/azure/information-protection/quickstart-deploy-client
190
+ text : Deploying the client
191
+ - url : https://docs.microsoft.com/azure/information-protection/tutorial-scan-networks-and-content
192
+ text : Discovering your sensitive content
193
+
194
+ - title : Microsoft Defender for Cloud Apps
195
+ links :
196
+ - url : https://docs.microsoft.com/defender-cloud-apps/what-is-defender-for-cloud-apps
197
+ text : What is Microsoft Defender for Cloud Apps?
198
+ - url : https://docs.microsoft.com/defender-cloud-apps/get-started
199
+ text : Get started
200
+ - url : https://docs.microsoft.com/defender-cloud-apps/tutorial-suspicious-activity
201
+ text : Detect and manage suspicious activity
202
+
203
+ - title : Microsoft 365 Defender
204
+ links :
205
+ - url : https://docs.microsoft.com/microsoft-365/security/defender/microsoft-365-defender?view=o365-worldwide
206
+ text : What is Microsoft 365 Defender?
207
+ - url : https://docs.microsoft.com/microsoft-365/security/defender/get-started?view=o365-worldwide
208
+ text : Get started
209
+ - url : https://docs.microsoft.com/microsoft-365/security/defender/integrate-microsoft-365-defender-secops?view=o365-worldwide
210
+ text : Security operations guide
0 commit comments