I had planned on writing something similar to what’s below however this was a such a good roundup, I shamelessly stole the following from Jiadong Chen, Microsoft Cybersecurity MVP.
Microsoft is leading the way in security best practices with their comprehensive reference materials, such as the Microsoft Cybersecurity Reference Architectures, Microsoft cloud security benchmark, the Cloud Adoption Framework, and Microsoft security best practices provide valuable guidance on how to best protect systems and data in the cloud. In this post, I’d like to share some of the key Microsoft security best practices resources that can help ensure your organization’s security!
()
Diagrams and sections in MCRA are a key source of security best practices for many topics including:
- Zero trust user access, security operations, multicloud and cross-platform capabilities, operational technology (OT), attack chains, technical capability coverage, Azure native security controls, and security roles and responsibilities. https://lnkd.in/gZ_t_88h
()
To rapidly adopt Zero Trust in your organization, RaMP offers technical deployment guidance organized in these initiatives:
- Explicitly validate trust for all access requests https://lnkd.in/g6MjQDpy
- Ransomware recovery readiness https://lnkd.in/gYkFm5zF
- Data protection https://lnkd.in/gn5XzcuV
- And more! https://lnkd.in/gEr5q2ET
()
The MCSB provides security best practices for Microsoft Azure, on-premises datacenters, and other cloud providers, including two types of guidance:
- Security controls
Identity Management (IM): https://lnkd.in/d8bvgaUA
Network security (NS): https://lnkd.in/dRJfYfpV
and more! https://lnkd.in/drR5zmTk- Security baselines
Security baselines are standardized documents, describing the available security capabilities https://lnkd.in/dzYjPK5g
Full security baseline mapping file: https://lnkd.in/dMcTQvfA
Cloud Adoption Framework can help you get started with several different getting started guides, of which security is an important component.
- Azure Top 11 essential security practices: https://lnkd.in/dPjY2Axc
- Cloud security functions: https://lnkd.in/dTQvUwJ4
- Reference implementation: https://lnkd.in/dTKgmBcV
Assess your Security Journey for Cloud Adoption. Receive actionable considerations to improve your security posture. https://lnkd.in/dH-tV95F()
Helps accelerate security program modernization with reference strategies built using Zero Trust principles https://lnkd.in/dFhNZGFP