Skip to content

Commit b61f5a0

Browse files
committed
add links
1 parent 776d97d commit b61f5a0

File tree

1 file changed

+13
-13
lines changed

1 file changed

+13
-13
lines changed

unified-secops-platform/overview-posture.md

Lines changed: 13 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -14,14 +14,14 @@ ms.collection:
1414
- usx-security
1515
ms.topic: overview
1616

17-
# customer intent: As a security professional, I want to understand how Microsoft's unified security operations platform, including tools like Microsoft Security Exposure Management (MSEM) and programs like Continuous Threat Exposure Management (CTEM), can enhance my organization's security posture by providing comprehensive visibility, prioritizing remediation efforts, and continuously monitoring for threats.
17+
# customer intent: As a security professional, I want to understand how Microsoft's unified security operations platform, including tools like Microsoft Security Exposure Management (Exposure Management) and programs like Continuous Threat Exposure Management (CTEM), can enhance my organization's security posture by providing comprehensive visibility, prioritizing remediation efforts, and continuously monitoring for threats.
1818
---
1919

2020
# What is security posture?
2121

2222
Security posture refers to an organization’s strength of protection over its networks, data, and systems (hardware and software). It measures how vulnerable your organization is to cyber-attacks or data breaches.
2323

24-
Microsoft Security Exposure Management (MSEM) is a proactive approach to managing and mitigating security risks. Use tools like MSEM to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities.
24+
Microsoft Security Exposure Management (MSEM) is a proactive approach to managing and mitigating security risks. Use tools like Exposure Management to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities.
2525

2626
Proactively protecting your organization from potential data breaches is more effective than just doing damage control once a breach occurs.
2727
Continuous Threat Exposure Management (CTEM) steps enhance this proactive approach by providing a structured method to identify, evaluate, and manage security risks. The CTEM steps, which include Scoping, Discovery, Prioritization, and Validation, can be integrated into your security posture management plan.
@@ -40,27 +40,27 @@ Maintain an up-to-date inventory of your assets, including on-premises resources
4040

4141
## Education and training
4242

43-
Security posture management is a complex topic that requires a wide range of technical knowledge. Continuously educate and train your operations and incident response staff on MSEM technologies and how your organization uses them. This ensures your team is prepared to handle security incidents effectively.
43+
Security posture management is a complex topic that requires a wide range of technical knowledge. Continuously educate and train your operations and incident response staff on Exposure Management technologies and how your organization uses them. This ensures your team is prepared to handle security incidents effectively.
4444

4545
### Incident classification framework
4646

4747
Define what constitutes a "security incident" for your organization and develop a method for classifying incidents. A classification framework helps prioritize response and preparation activities, collect useful metrics, and improve the performance of your posture management program. Categories might include denial of service, malware, or unauthorized access, with impact-based severity levels such as critical, high, medium, or low.
4848

4949
## Assess your security posture
5050

51-
Use MSEM to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities. MSEM provides a 360-degree view of your security landscape, helping you understand and quantify your attack surface exposure.
51+
Use Exposure Management to get a comprehensive view of your organization's security posture, including key metrics, critical assets, and potential vulnerabilities. Exposure Management provides a 360-degree view of your security landscape, helping you understand and quantify your attack surface exposure.
5252

5353
Learn more here, [What is Microsoft Security Exposure Management?](/security-exposure-management/microsoft-security-exposure-management)
5454

5555
## Identify attack entry points
5656

57-
MSEM helps you identify and map out potential attack paths, giving you visibility into critical choke points that need to be addressed. This proactive approach allows you to close down attack paths before they can be exploited.
57+
Exposure Management helps you identify and map out potential attack paths, giving you visibility into critical choke points that need to be addressed. This proactive approach allows you to close down attack paths before they can be exploited.
5858

5959
Learn more here, [Overview of attack surface management](/security-exposure-management/cross-workload-attack-surfaces)
6060

6161
## Prioritize remediation efforts
6262

63-
Focus on the most critical vulnerabilities and attack paths first. MSEM provides recommendations for remediation actions to help you prioritize your efforts. This ensures that your resources are used effectively to mitigate the most significant risks.
63+
Focus on the most critical vulnerabilities and attack paths first. Exposure Management provides recommendations for remediation actions to help you prioritize your efforts. This ensures that your resources are used effectively to mitigate the most significant risks.
6464

6565
Learn more here, [Review security recommendations](/security-exposure-management/security-recommendations)
6666

@@ -70,20 +70,20 @@ Incorporate the **Validation** step to test and confirm that remediation efforts
7070

7171
## Key considerations for users
7272

73-
For users new to MSEM, it's important to understand the following benefits:
73+
For users new to Exposure Management, it's important to understand the following benefits:
7474

75-
- **Comprehensive view**: MSEM provides a 360-degree view of your organization's security posture, helping you understand the overall security landscape.
75+
- **Comprehensive view**: Exposure Management provides a 360-degree view of your organization's security posture, helping you understand the overall security landscape.
7676
- **Prioritization**: Focus on the most critical vulnerabilities and attack paths first to maximize the impact of your remediation efforts.
77-
- **Continuous monitoring**: MSEM continuously monitors your threat exposure and provides updates on your security posture.
77+
- **Continuous monitoring**: Exposure Management continuously monitors your threat exposure and provides updates on your security posture.
7878

7979
For users with an established posture program, consider the following advanced features:
8080

81-
- **Integration**: MSEM integrates with existing security tools and solutions, providing a unified view of your security posture.
82-
- **Advanced metrics**: Utilize advanced security metrics and insights provided by MSEM to fine-tune your security strategies.
81+
- **Integration**: Exposure Management integrates with existing security tools and solutions, providing a unified view of your security posture.
82+
- **Advanced metrics**: Utilize advanced security metrics and insights provided by Exposure Management to fine-tune your security strategies.
8383
- **Collaboration**: Work with different teams within your organization to ensure a coordinated approach to exposure management.
8484

85-
A great starting point for any user is to set a specific goal. For instance, you might choose to enhance Ransomware Protection initiative by 20%. Use MSEM metrics and recommendations to identify and mitigate vulnerabilities that could be exploited by ransomware attacks to achieve this improvement.
85+
A great starting point for any user is to set a specific goal. For instance, you might choose to enhance Ransomware Protection initiative by 20%. Use Exposure Management metrics and recommendations to identify and mitigate vulnerabilities that could be exploited by ransomware attacks to achieve this improvement.
8686

8787
## Ensuring your security posture
8888

89-
Maintaining a robust security posture is essential for safeguarding your organization's networks, data, and systems against cyber threats. By using tools like Microsoft Security Exposure Management (MSEM), you can gain a comprehensive view of your security landscape, identify critical vulnerabilities, and prioritize remediation efforts effectively. Continuous monitoring and proactive measures are key to staying ahead of potential threats and ensuring that your security posture remains strong. Following the guidelines outlined here and fostering a culture of security awareness, your organization can better protect itself from cyber-attacks and data breaches, building trust with customers and stakeholders.
89+
Maintaining a robust security posture is essential for safeguarding your organization's networks, data, and systems against cyber threats. By using tools like Microsoft Security Exposure Management (Exposure Management), you can gain a comprehensive view of your security landscape, identify critical vulnerabilities, and prioritize remediation efforts effectively. Continuous monitoring and proactive measures are key to staying ahead of potential threats and ensuring that your security posture remains strong. Following the guidelines outlined here and fostering a culture of security awareness, your organization can better protect itself from cyber-attacks and data breaches, building trust with customers and stakeholders.

0 commit comments

Comments
 (0)