Skip to content

Commit 53ae428

Browse files
committed
clean up formatting, add questions to manage
1 parent f780035 commit 53ae428

File tree

9 files changed

+87
-67
lines changed

9 files changed

+87
-67
lines changed

learn-pr/azure/cloud-adoption-framework-security/2-methodology.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,9 @@ quiz:
2323
- content: To provide a structured approach that you can use to enhance workload security and compliance
2424
isCorrect: true
2525
explanation: Correct. The primary goal of the Secure methodology is to ensure that workloads are highly secure and compliant.
26-
- content: To search a unified audit log and view user and administrator activity in your organization
26+
- content: To provide a cloud-based environment that enables you to build, deploy, and manage applications
2727
isCorrect: false
28-
explanation: Incorrect. Searching audit logs and viewing activity aren't the primary goals of the Secure methodology.
29-
- content: To standardizes the process for requesting, deploying, and governing subscriptions so that application teams can deploy their workloads faster
28+
explanation: Incorrect. Providing a cloud-based environment isn't the primary goal of the Secure methodology.
29+
- content: To standardize the process for requesting, deploying, and governing subscriptions so that you can deploy your workloads faster
3030
isCorrect: false
3131
explanation: Incorrect. Standardizing processes for subscriptions isn't the focus of the Secure methodology.

learn-pr/azure/cloud-adoption-framework-security/5-plan.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ quiz:
2222
explanation: Incorrect. While important, building an incident response plan isn't the primary purpose of landing zones.
2323
- content: To incorporate templates for infrastructure as code (IaC) deployments
2424
isCorrect: false
25-
explanation: Incorrect. Although landing zones may use infrastructure as code (IaC) templates, their main purpose is not to incorporate these templates but to provide a secure and scalable foundation.
25+
explanation: Incorrect. Although landing zones may use infrastructure as code (IaC) templates, their main purpose isn't to incorporate these templates but to provide a secure and scalable foundation.
2626
- content: To enhance data analytics capabilities
2727
isCorrect: false
28-
explanation: Incorrect. Enhancing data analytics capabilities is not the primary goal of landing zones.
28+
explanation: Incorrect. Enhancing data analytics capabilities isn't the primary goal of landing zones.
2929
- content: To provide a highly secure and scalable foundation for cloud environments
3030
isCorrect: true
3131
explanation: Correct. The primary purpose of landing zones is to provide a highly secure and scalable foundation for cloud environments, which helps ensure consistency and compliance with security policies.

learn-pr/azure/cloud-adoption-framework-security/6-ready.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@ content: |
1515
quiz:
1616
title: Check your knowledge
1717
questions:
18-
- content: Which principle should be followed to grant users minimal access needed for their tasks?
18+
- content: Which principle grants users minimal access needed for their tasks?
1919
choices:
20-
- content: Role-based access control (RBAC)
20+
- content: RBAC
2121
isCorrect: false
2222
explanation: Incorrect. RBAC manages access to resources based on user roles.
23-
- content: Multifactor authentication (MFA)
23+
- content: MFA
2424
isCorrect: false
2525
explanation: Incorrect. MFA adds an extra layer of security by requiring multiple forms of verification.
2626
- content: The principle of least privilege

learn-pr/azure/cloud-adoption-framework-security/8-govern.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,10 +22,10 @@ quiz:
2222
explanation: Correct. The primary goal of security governance is to align business priorities with technical implementations like architecture, standards, and policies.
2323
- content: Streamlining project management
2424
isCorrect: false
25-
explanation: Incorrect. Streamlining project management is not the primary goal of security governance.
25+
explanation: Incorrect. Streamlining project management isn't the primary goal of security governance.
2626
- content: Improving data backup processes
2727
isCorrect: false
28-
explanation: Incorrect. Improving data backup processes is not the primary goal of security governance.
28+
explanation: Incorrect. Improving data backup processes isn't the primary goal of security governance.
2929
- content: Optimizing resource allocation
3030
isCorrect: false
31-
explanation: Incorrect. Optimizing resource allocation is not the main focus of security governance.
31+
explanation: Incorrect. Optimizing resource allocation isn't the main focus of security governance.

learn-pr/azure/cloud-adoption-framework-security/9-manage.yml

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,4 +11,21 @@ metadata:
1111
ms.topic: unit
1212
durationInMinutes: 20
1313
content: |
14-
[!include[](includes/9-manage.md)]
14+
[!include[](includes/9-manage.md)]
15+
quiz:
16+
title: Check your knowledge
17+
questions:
18+
- content: Which principle should you adopt to help modernize your observability platform?
19+
choices:
20+
- content: Trust by default
21+
isCorrect: false
22+
explanation: Incorrect. Trust by default assumes that all activities are trusted unless proven otherwise, which isn't suitable for modern security practices.
23+
- content: Trust by exception
24+
isCorrect: true
25+
explanation: Correct. Trust by exception implies that you use identity and access monitoring to detect anomalous behavior in real-time, which is essential for modern observability.
26+
- content: Trust by design
27+
isCorrect: false
28+
explanation: Incorrect. While designing systems with security in mind is important, this principle doesn't specifically address the need to validate only when necessary, which is essential for modern observability.
29+
- content: Trust by verification
30+
isCorrect: false
31+
explanation: Incorrect. Although verification is a key component of security, this principle doesn't fully capture the proactive and continuous nature of monitoring and validating activities required to modernize an observability platform.

learn-pr/azure/cloud-adoption-framework-security/includes/6-ready.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -14,17 +14,18 @@ To [modernize your security posture](/azure/cloud-adoption-framework/secure/read
1414

1515
### Azure facilitation
1616

17-
- **Azure landing zone accelerators** are prepackaged deployments for various workloads, such as [Azure Integration Services](/azure/cloud-adoption-framework/scenarios/app-platform/integration-services/landing-zone-accelerator), [Azure Kubernetes Service (AKS)](/azure/cloud-adoption-framework/scenarios/app-platform/aks/landing-zone-accelerator), and [Azure API Management](/azure/cloud-adoption-framework/scenarios/app-platform/api-management/landing-zone-accelerator). These accelerators help you quickly set up landing zones. For a full list, see [Modern application platform scenario](/azure/cloud-adoption-framework/scenarios/app-platform/).
17+
- Azure landing zone accelerators are prepackaged deployments for various workloads, such as [Azure Integration Services](/azure/cloud-adoption-framework/scenarios/app-platform/integration-services/landing-zone-accelerator), [Azure Kubernetes Service (AKS)](/azure/cloud-adoption-framework/scenarios/app-platform/aks/landing-zone-accelerator), and [Azure API Management](/azure/cloud-adoption-framework/scenarios/app-platform/api-management/landing-zone-accelerator). These accelerators help you quickly set up landing zones. For a full list, see [Modern application platform scenario](/azure/cloud-adoption-framework/scenarios/app-platform/).
1818

19-
- **The Azure landing zones Terraform module** [automates your landing zone deployments](https://registry.terraform.io/modules/Azure/caf-enterprise-scale/azurerm/latest). To help ensure consistent and secure landing zones, deploy landing zones through your continuous integration and continuous deployment (CI/CD) pipeline.
19+
- [The Azure landing zones Terraform module](https://registry.terraform.io/modules/Azure/caf-enterprise-scale/azurerm/latest) automates your landing zone deployments. To help ensure consistent and secure landing zones, deploy landing zones through your continuous integration and continuous deployment (CI/CD) pipeline.
2020

21-
- **Microsoft Entra** verifies identities, validates access conditions, checks permissions, encrypts connections, and monitors for compromise. [Microsoft Entra](/entra/fundamentals/what-is-entra) includes identity and network access products that help you incorporate a Zero Trust security strategy.
21+
- [Microsoft Entra](/entra/fundamentals/what-is-entra) verifies identities, validates access conditions, checks permissions, encrypts connections, and monitors for compromise. Microsoft Entra includes identity and network access products that help you incorporate a Zero Trust security strategy.
2222

2323
## Prepare for incidents and response
2424

2525
After you define your strategy and plan for incident preparedness and response, you can [begin implementation](/azure/cloud-adoption-framework/secure/ready#prepare-for-incident-preparedness-and-response). Network segregation is crucial for security, whether you use a full enterprise landing zone or a simpler design.
2626

2727
- **Design your network with segmentation and isolation** to reduce attack surfaces and contain breaches.
28+
2829
- **Use virtual private clouds (VPCs), subnets, and security groups** to control traffic.
2930

3031
### Azure facilitation
@@ -47,7 +48,7 @@ Microsoft Entra Conditional Access is the Microsoft Zero Trust policy engine. It
4748

4849
Ensure that you have [well-governed policies and standards](/azure/cloud-adoption-framework/secure/ready#prepare-for-integrity) for your data and system integrity. Define standards for the following areas.
4950

50-
- **Data management**
51+
- **Data management:**
5152
- *Create a framework and sensitivity-label taxonomy* to define data security risk categories. Use this taxonomy to simplify data inventory, policy management, and investigation prioritization.
5253

5354
- *Automate data verification and validation processes* to reduce the burden on data engineers and minimize human error.
@@ -56,7 +57,7 @@ Ensure that you have [well-governed policies and standards](/azure/cloud-adoptio
5657

5758
- *Ensure that your cloud provider encrypts data at rest and data in transit by default.* Verify that services in your workloads support and are configured for strong encryption.
5859

59-
- **System integrity design patterns**
60+
- **System integrity design patterns:**
6061
- *Design a robust security monitoring platform* to detect unauthorized changes.
6162

6263
- *Use security information and event management (SIEM), security orchestration, automation, and response (SOAR), and threat detection tools* to identify suspicious activities and potential threats.

0 commit comments

Comments
 (0)