You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/2-methodology.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -23,9 +23,9 @@ quiz:
23
23
- content: To provide a structured approach that you can use to enhance workload security and compliance
24
24
isCorrect: true
25
25
explanation: Correct. The primary goal of the Secure methodology is to ensure that workloads are highly secure and compliant.
26
-
- content: To search a unified audit log and view user and administrator activity in your organization
26
+
- content: To provide a cloud-based environment that enables you to build, deploy, and manage applications
27
27
isCorrect: false
28
-
explanation: Incorrect. Searching audit logs and viewing activity aren't the primary goals of the Secure methodology.
29
-
- content: To standardizes the process for requesting, deploying, and governing subscriptions so that application teams can deploy their workloads faster
28
+
explanation: Incorrect. Providing a cloud-based environment isn't the primary goal of the Secure methodology.
29
+
- content: To standardize the process for requesting, deploying, and governing subscriptions so that you can deploy your workloads faster
30
30
isCorrect: false
31
31
explanation: Incorrect. Standardizing processes for subscriptions isn't the focus of the Secure methodology.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/5-plan.yml
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -22,10 +22,10 @@ quiz:
22
22
explanation: Incorrect. While important, building an incident response plan isn't the primary purpose of landing zones.
23
23
- content: To incorporate templates for infrastructure as code (IaC) deployments
24
24
isCorrect: false
25
-
explanation: Incorrect. Although landing zones may use infrastructure as code (IaC) templates, their main purpose is not to incorporate these templates but to provide a secure and scalable foundation.
25
+
explanation: Incorrect. Although landing zones may use infrastructure as code (IaC) templates, their main purpose isn't to incorporate these templates but to provide a secure and scalable foundation.
26
26
- content: To enhance data analytics capabilities
27
27
isCorrect: false
28
-
explanation: Incorrect. Enhancing data analytics capabilities is not the primary goal of landing zones.
28
+
explanation: Incorrect. Enhancing data analytics capabilities isn't the primary goal of landing zones.
29
29
- content: To provide a highly secure and scalable foundation for cloud environments
30
30
isCorrect: true
31
31
explanation: Correct. The primary purpose of landing zones is to provide a highly secure and scalable foundation for cloud environments, which helps ensure consistency and compliance with security policies.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/8-govern.yml
+3-3Lines changed: 3 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -22,10 +22,10 @@ quiz:
22
22
explanation: Correct. The primary goal of security governance is to align business priorities with technical implementations like architecture, standards, and policies.
23
23
- content: Streamlining project management
24
24
isCorrect: false
25
-
explanation: Incorrect. Streamlining project management is not the primary goal of security governance.
25
+
explanation: Incorrect. Streamlining project management isn't the primary goal of security governance.
26
26
- content: Improving data backup processes
27
27
isCorrect: false
28
-
explanation: Incorrect. Improving data backup processes is not the primary goal of security governance.
28
+
explanation: Incorrect. Improving data backup processes isn't the primary goal of security governance.
29
29
- content: Optimizing resource allocation
30
30
isCorrect: false
31
-
explanation: Incorrect. Optimizing resource allocation is not the main focus of security governance.
31
+
explanation: Incorrect. Optimizing resource allocation isn't the main focus of security governance.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/9-manage.yml
+18-1Lines changed: 18 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -11,4 +11,21 @@ metadata:
11
11
ms.topic: unit
12
12
durationInMinutes: 20
13
13
content: |
14
-
[!include[](includes/9-manage.md)]
14
+
[!include[](includes/9-manage.md)]
15
+
quiz:
16
+
title: Check your knowledge
17
+
questions:
18
+
- content: Which principle should you adopt to help modernize your observability platform?
19
+
choices:
20
+
- content: Trust by default
21
+
isCorrect: false
22
+
explanation: Incorrect. Trust by default assumes that all activities are trusted unless proven otherwise, which isn't suitable for modern security practices.
23
+
- content: Trust by exception
24
+
isCorrect: true
25
+
explanation: Correct. Trust by exception implies that you use identity and access monitoring to detect anomalous behavior in real-time, which is essential for modern observability.
26
+
- content: Trust by design
27
+
isCorrect: false
28
+
explanation: Incorrect. While designing systems with security in mind is important, this principle doesn't specifically address the need to validate only when necessary, which is essential for modern observability.
29
+
- content: Trust by verification
30
+
isCorrect: false
31
+
explanation: Incorrect. Although verification is a key component of security, this principle doesn't fully capture the proactive and continuous nature of monitoring and validating activities required to modernize an observability platform.
Copy file name to clipboardExpand all lines: learn-pr/azure/cloud-adoption-framework-security/includes/6-ready.md
+6-5Lines changed: 6 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,17 +14,18 @@ To [modernize your security posture](/azure/cloud-adoption-framework/secure/read
14
14
15
15
### Azure facilitation
16
16
17
-
-**Azure landing zone accelerators** are prepackaged deployments for various workloads, such as [Azure Integration Services](/azure/cloud-adoption-framework/scenarios/app-platform/integration-services/landing-zone-accelerator), [Azure Kubernetes Service (AKS)](/azure/cloud-adoption-framework/scenarios/app-platform/aks/landing-zone-accelerator), and [Azure API Management](/azure/cloud-adoption-framework/scenarios/app-platform/api-management/landing-zone-accelerator). These accelerators help you quickly set up landing zones. For a full list, see [Modern application platform scenario](/azure/cloud-adoption-framework/scenarios/app-platform/).
17
+
- Azure landing zone accelerators are prepackaged deployments for various workloads, such as [Azure Integration Services](/azure/cloud-adoption-framework/scenarios/app-platform/integration-services/landing-zone-accelerator), [Azure Kubernetes Service (AKS)](/azure/cloud-adoption-framework/scenarios/app-platform/aks/landing-zone-accelerator), and [Azure API Management](/azure/cloud-adoption-framework/scenarios/app-platform/api-management/landing-zone-accelerator). These accelerators help you quickly set up landing zones. For a full list, see [Modern application platform scenario](/azure/cloud-adoption-framework/scenarios/app-platform/).
18
18
19
-
-**The Azure landing zones Terraform module**[automates your landing zone deployments](https://registry.terraform.io/modules/Azure/caf-enterprise-scale/azurerm/latest). To help ensure consistent and secure landing zones, deploy landing zones through your continuous integration and continuous deployment (CI/CD) pipeline.
19
+
-[The Azure landing zones Terraform module](https://registry.terraform.io/modules/Azure/caf-enterprise-scale/azurerm/latest) automates your landing zone deployments. To help ensure consistent and secure landing zones, deploy landing zones through your continuous integration and continuous deployment (CI/CD) pipeline.
20
20
21
-
-**Microsoft Entra** verifies identities, validates access conditions, checks permissions, encrypts connections, and monitors for compromise. [Microsoft Entra](/entra/fundamentals/what-is-entra) includes identity and network access products that help you incorporate a Zero Trust security strategy.
21
+
-[Microsoft Entra](/entra/fundamentals/what-is-entra) verifies identities, validates access conditions, checks permissions, encrypts connections, and monitors for compromise. Microsoft Entra includes identity and network access products that help you incorporate a Zero Trust security strategy.
22
22
23
23
## Prepare for incidents and response
24
24
25
25
After you define your strategy and plan for incident preparedness and response, you can [begin implementation](/azure/cloud-adoption-framework/secure/ready#prepare-for-incident-preparedness-and-response). Network segregation is crucial for security, whether you use a full enterprise landing zone or a simpler design.
26
26
27
27
-**Design your network with segmentation and isolation** to reduce attack surfaces and contain breaches.
28
+
28
29
-**Use virtual private clouds (VPCs), subnets, and security groups** to control traffic.
29
30
30
31
### Azure facilitation
@@ -47,7 +48,7 @@ Microsoft Entra Conditional Access is the Microsoft Zero Trust policy engine. It
47
48
48
49
Ensure that you have [well-governed policies and standards](/azure/cloud-adoption-framework/secure/ready#prepare-for-integrity) for your data and system integrity. Define standards for the following areas.
49
50
50
-
-**Data management**
51
+
-**Data management:**
51
52
-*Create a framework and sensitivity-label taxonomy* to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
52
53
53
54
-*Automate data verification and validation processes* to reduce the burden on data engineers and minimize human error.
@@ -56,7 +57,7 @@ Ensure that you have [well-governed policies and standards](/azure/cloud-adoptio
56
57
57
58
-*Ensure that your cloud provider encrypts data at rest and data in transit by default.* Verify that services in your workloads support and are configured for strong encryption.
58
59
59
-
-**System integrity design patterns**
60
+
-**System integrity design patterns:**
60
61
-*Design a robust security monitoring platform* to detect unauthorized changes.
61
62
62
63
-*Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools* to identify suspicious activities and potential threats.
0 commit comments