Skip to content

Commit 4b85acf

Browse files
committed
updates and images
1 parent 75b36b7 commit 4b85acf

File tree

1 file changed

+1
-3
lines changed

1 file changed

+1
-3
lines changed

unified-secops-platform/overview-msem-strategy.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -27,13 +27,11 @@ Microsoft Security Exposure Management transforms the attack surface by providin
2727

2828
Proactively protecting your organization from potential data breaches is more effective than just doing damage control once a breach occurs.
2929

30-
Continuous Threat Exposure Management (CTEM) steps can enhance this proactive approach by providing a structured method to identify, evaluate, and manage security risks. The CTEM steps, which include Scoping, Discovery, Prioritization, and Validation, can be integrated into your security posture management plan.
31-
3230
## Scoping - Make a plan
3331

3432
A well-defined plan is essential for effective exposure management. Your plan should outline the purpose and objectives of posture management for your organization, aligning with legal and regulatory requirements and the risks to your organization's goals. Identify internal stakeholders and important external parties and establish clear roles and responsibilities.
3533

36-
Continuous Threat Exposure Management (CTEM) steps can enhance this proactive approach by providing a structured method to identify, evaluate, and manage security risks. The CTEM steps, which include Scoping, Discovery, Prioritization, and Validation, can be integrated into your security posture management plan.
34+
:::image type="content" source="media/reduce-risk-overview/MS_products.png" alt-text="Graphic of MSEM and XDR working together":::
3735

3836
## Discovery - Find vulnerabilities
3937

0 commit comments

Comments
 (0)