|
84 | 84 | items:
|
85 | 85 | - name: Zero Trust
|
86 | 86 | href: ../fundamentals/zero-trust.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
|
| 87 | + - name: Design for zero trust model |
| 88 | + href: /azure/architecture/framework/mission-critical/mission-critical-security.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 89 | + |
| 90 | +- name: Detect and mitigate threats |
| 91 | + items: |
| 92 | + - name: Protect against ransomware and extortion |
| 93 | + items: |
| 94 | + - name: Ransomware protection in Azure |
| 95 | + href: ../fundamentals/ransomware-protection.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 96 | + - name: Prepare for an attack |
| 97 | + href: ../fundamentals/ransomware-prepare.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 98 | + - name: Detect and respond to an attack |
| 99 | + href: ../fundamentals/ransomware-detect-respond.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 100 | + - name: Azure features & resources that help you protect, detect, and respond |
| 101 | + href: ../fundamentals/ransomware-features-resources.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 102 | + - name: Back up and restore plan for ransomware |
| 103 | + href: ../fundamentals/backup-plan-to-protect-against-ransomware.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 104 | + - name: Ransomware protection with Azure Firewall Premium |
| 105 | + href: ../fundamentals/ransomware-protection-with-azure-firewall.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 106 | + - name: Recovering from systemic identity compromise |
| 107 | + href: ../fundamentals/recover-from-identity-compromise.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 108 | + - name: Threat protection |
| 109 | + href: ../fundamentals/threat-detection.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
| 110 | + - name: Threat analysis |
| 111 | + href: /azure/architecture/framework/security/design-threat-model?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
87 | 112 |
|
88 | 113 | - name: Secure and protect
|
89 | 114 | items:
|
|
225 | 250 | - name: Security checklist
|
226 | 251 | href: ../fundamentals/operational-checklist.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json
|
227 | 252 |
|
228 |
| -- name: Detect and mitigate threats |
229 |
| - items: |
230 |
| - - name: Backup and restore plan for ransomware |
231 |
| - href: ../fundamentals/backup-plan-to-protect-against-ransomware.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
232 |
| - - name: Threat protection |
233 |
| - href: ../fundamentals/threat-detection.md?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
234 |
| - - name: Threat analysis |
235 |
| - href: /azure/architecture/framework/security/design-threat-model?toc=/azure/security/journey/toc.json&bc=/azure/security/breadcrumb/toc.json |
236 |
| - |
237 | 253 | - name: Investigate suspicious activity
|
238 | 254 | items:
|
239 | 255 | - name: Azure logging and auditing
|
|
0 commit comments