Skip to content

Commit d927122

Browse files
Merge pull request #298751 from msmbaldwin/freshness
update
2 parents b7380a3 + c69af55 commit d927122

10 files changed

+21
-16
lines changed

articles/security/fundamentals/cyber-services.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 925ba3c6-fe35-413a-98ea-e1a1461f3022
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/28/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/double-encryption.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 9dcb190e-e534-4787-bf82-8ce73bf47dba
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/27/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414
---
1515
# Double encryption

articles/security/fundamentals/encryption-models.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Data encryption models in Microsoft Azure
33
description: This article provides an overview of data encryption models In Microsoft Azure.
44
author: msmbaldwin
55
ms.author: mbaldwin
6-
ms.date: 07/19/2024
6+
ms.date: 04/23/2025
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article

articles/security/fundamentals/infrastructure-availability.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/28/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/infrastructure-components.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: 61e95a87-39c5-48f5-aee6-6f90ddcd336e
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: article
12-
ms.date: 06/28/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/ransomware-prepare.md

Lines changed: 12 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ ms.service: security
66
ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
9-
ms.date: 06/28/2024
9+
ms.date: 04/23/2025
1010
---
1111

1212
# Prepare for a ransomware attack
@@ -38,7 +38,12 @@ Ultimately, the Framework is aimed at reducing and better managing cybersecurity
3838

3939
## Prioritize mitigation
4040

41-
Based on our experience with ransomware attacks, we find that prioritization should focus on: 1) prepare, 2) limit, 3) prevent. This may seem counterintuitive, since most people want to prevent an attack and move on. Unfortunately, we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it's not a pleasant truth to accept, we're facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it's important to prepare for the worst and establish frameworks to contain and prevent attackers' ability to get what they're after.
41+
Based on our experience with ransomware attacks, we find that prioritization should focus on:
42+
1. Prepare
43+
1. Limit
44+
1. Prevent
45+
46+
This may seem counterintuitive, since most people want to prevent an attack and move on. Unfortunately, we must assume breach (a key Zero Trust principle) and focus on reliably mitigating the most damage first. This prioritization is critical because of the high likelihood of a worst-case scenario with ransomware. While it's not a pleasant truth to accept, we're facing creative and motivated human attackers who are adept at finding a way to control the complex real-world environments in which we operate. Against that reality, it's important to prepare for the worst and establish frameworks to contain and prevent attackers' ability to get what they're after.
4247

4348
While these priorities should govern what to do first, we encourage organizations to run steps in parallel where possible, including pulling quick wins forward from step 1 when you can.
4449

@@ -48,7 +53,7 @@ Prevent a ransomware attacker from entering your environment and rapidly respond
4853

4954
To achieve this, organizations should identify and execute quick wins to strengthen security controls to prevent entry, and rapidly detect/evict attackers while implementing a sustained program that helps them stay secure. Microsoft recommends organizations follow the principles outlined in the Zero Trust strategy [here](https://aka.ms/zerotrust). Specifically, against Ransomware, organizations should prioritize:
5055
- Improving security hygiene by focusing efforts on attack surface reduction and threat and vulnerability management for assets in their estate.
51-
- Implementing Protection, Detection and Response controls for their digital assets that can protect against commodity and advanced threats, provide visibility and alerting on attacker activity and respond to active threats.
56+
- Implementing Protection, Detection and Response controls for their digital assets that can protect against commodity and advanced threats, provide visibility, and alerting on attacker activity and respond to active threats.
5257

5358
## Limit scope of damage
5459

@@ -138,18 +143,18 @@ Ensure your organization undertakes a number of activities roughly following the
138143
1. **Investigation / Analysis**: This stage describes the activities that should be undertaken to investigate and analyze available data when it isn't clear that an incident has occurred, with the goal of either confirming that an incident should be declared or concluded that an incident hasn't occurred.
139144
1. **Incident Declaration**: This stage covers the steps that must be taken to declare an incident, typically with the raising of a ticket within the enterprise incident management (ticketing) system and directing the ticket to the appropriate personnel for further evaluation and action.
140145
1. **Containment / Mitigation**: This stage covers the steps that may be taken either by the Security Operations Center (SOC), or by others, to contain or mitigate (stop) the incident from continuing to occur or limiting the effect of the incident using available tools, techniques, and procedures.
141-
1. **Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage that was caused by the incident before it was contained and mitigated.
142-
1. **Post-Incident Activity**: This stage covers the activities that should be performed once the incident has been closed. This can include capturing the final narrative associated with the incident as well as identifying lessons learned.
146+
2. **Remediation / Recovery**: This stage covers the steps that may be taken to remediate or recover from damage caused by the incident before it was contained and mitigated.
147+
3. **Post-Incident Activity**: This stage covers the activities that should be performed once the incident is closed. This can include capturing the final narrative associated with the incident and identifying lessons learned.
143148

144149
:::image type="content" source="./media/ransomware/ransomware-17.png" alt-text="Flowchart of an incident handling process":::
145150

146151
## Prepare for a quick recovery
147152

148153
Ensure that you have appropriate processes and procedures in place. Almost all ransomware incidents result in the need to restore compromised systems. So appropriate and tested backup and restore processes and procedures should be in place for most systems. There should also be suitable containment strategies in place with suitable procedures to stop ransomware from spreading and recovery from ransomware attacks.
149154

150-
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, antimalware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
155+
Ensure that you have well-documented procedures for engaging any third-party support, particularly support from threat intelligence providers, anti-malware solution providers and from the malware analysis provider. These contacts may be useful if the ransomware variant may have known weaknesses or decryption tools may be available.
151156

152-
The Azure platform provides backup and recovery options through Azure Backup as well built-in within various data services and workloads.
157+
The Azure platform provides backup and recovery options through Azure Backup as well built in within various data services and workloads.
153158

154159
Isolated backups with [Azure Backup](../../backup/backup-azure-security-feature.md#prevent-attacks)
155160
- Azure Virtual Machines

articles/security/fundamentals/services-technologies.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ ms.assetid: a5a7f60a-97e2-49b4-a8c5-7c010ff27ef8
99
ms.service: security
1010
ms.subservice: security-fundamentals
1111
ms.topic: conceptual
12-
ms.date: 04/27/2024
12+
ms.date: 04/23/2025
1313
ms.author: mbaldwin
1414

1515
---

articles/security/fundamentals/threat-detection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ manager: rkarlin
77
ms.service: security
88
ms.subservice: security-fundamentals
99
ms.topic: article
10-
ms.date: 06/27/2024
10+
ms.date: 04/23/2025
1111
ms.author: mbaldwin
1212

1313
---

articles/security/fundamentals/virtual-machines-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.assetid: 467b2c83-0352-4e9d-9788-c77fb400fe54
1010
ms.service: security
1111
ms.subservice: security-fundamentals
1212
ms.topic: article
13-
ms.date: 06/27/2024
13+
ms.date: 04/23/2025
1414
ms.author: mbaldwin
1515

1616
---

articles/security/fundamentals/zero-trust.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ ms.subservice: security-fundamentals
77
ms.topic: article
88
ms.author: mbaldwin
99
manager: rkarlin
10-
ms.date: 06/28/2024
10+
ms.date: 04/23/2025
1111
---
1212

1313
# Zero Trust security

0 commit comments

Comments
 (0)