Skip to content

Commit 13dddac

Browse files
committed
update images
1 parent ea6f9f2 commit 13dddac

18 files changed

+1242
-1258
lines changed

learn-pr/azure/cloud-adoption-framework-security/includes/1-introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ The Secure methodology in the Cloud Adoption Framework provides a structured app
22

33
The guidance in this module provides recommendations that are relevant to all methodologies within the Cloud Adoption Framework. You should incorporate security measures in every phase of your cloud adoption journey.
44

5-
:::image type="content" source="../media/caf-secure-overview.svg" alt-text="Diagram that shows how security relates to each Cloud Adoption Framework methodology." lightbox="../media/caf-secure-overview.svg" border="false":::
5+
:::image type="content" source="../media/secure-overview.svg" alt-text="Diagram that shows how security relates to each Cloud Adoption Framework methodology." lightbox="../media/secure-overview.svg" border="false":::
66

77
This module covers key security principles, methodologies, and best practices to help ensure a robust security posture. All recommendations adhere to the Zero Trust principles:
88

learn-pr/azure/cloud-adoption-framework-security/includes/3-teams-roles-functions.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes the [security roles required for cloud security](/azure/cloud-adoption-framework/secure/teams-roles). It also describes the functions that they perform related to cloud infrastructure and platforms. These roles help integrate security into every stage of the cloud lifecycle, from development to continuous improvement. Depending on your organization's size, individuals that perform multiple functions or specialized teams might fulfill these roles.
22

3-
:::image type="content" source="../media/caf-secure-teams-roles.svg" alt-text="Diagram that shows the teams and roles phase of the Secure methodology." lightbox="../media/caf-secure-teams-roles.svg" border="false":::
3+
:::image type="content" source="../media/secure-teams-roles.svg" alt-text="Diagram that shows the teams and roles phase of the Secure methodology." lightbox="../media/secure-teams-roles.svg" border="false":::
44

55
## Transformation of security roles
66

learn-pr/azure/cloud-adoption-framework-security/includes/4-strategy.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Strategy methodology](/azure/cloud-adoption-framework/secure/strategy/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-strategy.svg" alt-text="Diagram that shows the Strategy phase of the Secure methodology." lightbox="../media/caf-secure-strategy.svg" border="false":::
3+
:::image type="content" source="../media/secure-strategy.svg" alt-text="Diagram that shows the Strategy phase of the Secure methodology." lightbox="../media/secure-strategy.svg" border="false":::
44

55
Cloud adoption adds security complexity. Your strategy must address modern cloud challenges and integrate security into all facets of your organization. Unlike on-premises platforms, security in the cloud isn't a separate function. So you must implement security throughout your cloud adoption strategy.
66

learn-pr/azure/cloud-adoption-framework-security/includes/5-plan.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Plan methodology](/azure/cloud-adoption-framework/secure/plan/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-plan.svg" alt-text="Diagram that shows the Plan phase of the Secure methodology." lightbox="../media/caf-secure-plan.svg" border="false":::
3+
:::image type="content" source="../media/secure-plan.svg" alt-text="Diagram that shows the Plan phase of the Secure methodology." lightbox="../media/secure-plan.svg" border="false":::
44

55
A cloud adoption plan often has many technical challenges. You must carefully plan each step of your cloud adoption process, specifically when you update legacy workloads for cloud infrastructure. Prioritize security over performance and cost efficiency when you start your designs. This approach helps ensure that you don't introduce risks that could require you to redesign workloads later.
66

learn-pr/azure/cloud-adoption-framework-security/includes/6-ready.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Ready methodology](/azure/cloud-adoption-framework/secure/ready/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-ready.svg" alt-text="Diagram that shows the Ready phase of the Secure methodology." lightbox="../media/caf-secure-ready.svg" border="false":::
3+
:::image type="content" source="../media/secure-ready.svg" alt-text="Diagram that shows the Ready phase of the Secure methodology." lightbox="../media/secure-ready.svg" border="false":::
44

55
The Ready phase of cloud adoption focuses on building your estate's foundation. A landing zone approach provides a secure, scalable design for large organizations. Smaller organizations might not need landing zones but can still benefit from understanding this approach to create a secure and scalable foundation.
66

learn-pr/azure/cloud-adoption-framework-security/includes/7-adopt.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Adopt methodology](/azure/cloud-adoption-framework/secure/adopt/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-adopt.svg" alt-text="Diagram that shows the Adopt phase of the Secure methodology." lightbox="../media/caf-secure-adopt.svg" border="false":::
3+
:::image type="content" source="../media/secure-adopt.svg" alt-text="Diagram that shows the Adopt phase of the Secure methodology." lightbox="../media/secure-adopt.svg" border="false":::
44

55
When you implement your cloud estate and migrate workloads, establish robust security mechanisms from the start to avoid gaps later. Prioritize security during the Adopt phase to ensure consistent workloads. To prepare IT teams for cloud operations, establish well-designed policies and procedures.
66

learn-pr/azure/cloud-adoption-framework-security/includes/8-govern.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Govern methodology](/azure/cloud-adoption-framework/secure/govern/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-govern.svg" alt-text="Diagram that shows the Govern phase of the Secure methodology." lightbox="../media/caf-secure-govern.svg" border="false":::
3+
:::image type="content" source="../media/secure-govern.svg" alt-text="Diagram that shows the Govern phase of the Secure methodology." lightbox="../media/secure-govern.svg" border="false":::
44

55
Security governance aligns your business priorities with technical implementations like architecture, standards, and policies. Your governance teams oversee and monitor security to maintain and enhance your security posture.
66

learn-pr/azure/cloud-adoption-framework-security/includes/9-manage.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
This unit describes areas of security optimization to consider as you move through the [Manage methodology](/azure/cloud-adoption-framework/secure/manage/) phase of your journey.
22

3-
:::image type="content" source="../media/caf-secure-manage.svg" alt-text="Diagram that shows the Manage phase of the Secure methodology." lightbox="../media/caf-secure-manage.svg" border="false":::
3+
:::image type="content" source="../media/secure-manage.svg" alt-text="Diagram that shows the Manage phase of the Secure methodology." lightbox="../media/secure-manage.svg" border="false":::
44

55
The Manage phase focuses on the ongoing operation of your cloud estate. You must maintain and strengthen your security posture continuously to successfully manage your estate.
66

0 commit comments

Comments
 (0)