Skip to content

Commit 4555356

Browse files
authored
Merge branch 'main' into maccruz-analytics
2 parents 961c2a4 + 56f8610 commit 4555356

File tree

1 file changed

+9
-2
lines changed

1 file changed

+9
-2
lines changed

exposure-management/initiatives-list.md

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,6 +25,10 @@ The CIS Microsoft 365 Foundations Benchmark (v3.0.0) is a set of security assess
2525

2626
This initiative aims to reflect the status around cloud security coverage, ROI, health, configuration, and performance. It consists of measurements across multiple domains and disciplines to provide security managers with a high-level view into how posture is enforced in cloud ops.
2727

28+
> [!NOTE]
29+
>
30+
> The current Cloud initiative will be deprecated soon. A new Cloud initiative will be available soon. Please use it for updates and support.
31+
2832
## Critical Asset Protection
2933

3034
Critical asset protection refers to the strategies, processes, and technologies implemented to safeguard an organization's most valuable and important assets from various threats and risks. It involves identifying, prioritizing, and applying targeted security measures to ensure the resilience and integrity of these critical assets.
@@ -43,11 +47,11 @@ IoT devices are often connected to endpoints, to one another or to the internet,
4347

4448
## External Attack Surface Protection
4549

46-
The External Attack Surface Initiative in Microsoft Security Exposure Management uses Defender EASM to continuously discover and map your digital attack surface, providing an external view of your online infrastructure. This helps security and IT teams identify unknown assets, prioritize risks, eliminate threats, and extend control beyond the firewall.
50+
The External Attack Surface Management (EASM) initiative in Microsoft Security Exposure Management uses Defender EASM to continuously discover and map your digital attack surface, providing an external view of your online infrastructure. This helps security and IT teams identify unknown assets, prioritize risks, eliminate threats, and extend control beyond the firewall.
4751

4852
> [!NOTE]
4953
>
50-
> This initiative provides high-level insights without a full connection to the MDEASM subscription and supports pre-built footprints only.
54+
> This initiative provides high-level insights without a full connection to the MDEASM subscription and supports prebuilt footprints only.
5155
5256
[Learn more here.](https://aka.ms/xspm/EasmLearnMore)
5357

@@ -75,6 +79,9 @@ This initiative focuses on displaying the current state of SaaS (software as a s
7579

7680
This initiative serves as a central hub for security managers to continuously assess and analyze vulnerabilities and misconfigurations across the organization's digital landscape. In the Vulnerability Assessment initiative users can actively identify, prioritize, track, and delegate vulnerabilities with in the IT infrastructure and the cloud. Users gain real-time visibility into the security posture of their organization, enabling data-driven decision-making for resource investment and placement. This collaborative environment ensures a holistic approach to vulnerability management, empowering stakeholders to proactively strengthen their security defenses, reduce the attack surface, and enhance overall resilience against evolving cyber threats.
7781

82+
> [!NOTE]
83+
> The Vulnerability Assessment initiative will be deprecated soon, as it is now part of the new Cloud initiative. Use the new Cloud initiative for updates and support.
84+
7885
## Zero Trust (Foundational)
7986

8087
Zero Trust is a security strategy that follows three principles, verify explicitly, use least privilege access, and assume breach. This initiative follows Microsoft's Zero Trust adoption framework to help you identify next steps in your Zero Trust strategy. You can learn more about the Zero Trust adoption framework here.

0 commit comments

Comments
 (0)