SECURITY OPERATIONS MANAGEMENT IMMERSIVE PROGRAM
MODULE #1: MANAGING INFORMATION SYSTEMS SECURITY
MODULE #2: MONITORING ZERO-TRUST
Overview and landing page: Zero Trust Deployment Center
Today, organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.
This is the core of Zero Trust. Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to โnever trust, always verify.โ
Guiding principles of Zero-Trust
#CloudComputing #ZeroTrust #CyberSecurity
Introduction with Microsoftโs view on Zero Trust
[Article] Zero TrustโPart 1: Networking
#ZeroTrust #Networking #ModernIT #CyberSecurity
[Article] Zero Trust Adoption: Managing Risk with Cybersecurity Engineering and Adaptive Risk Assessment
[Article]Elemental moving pieces of #ZeroTrust in the Microsoft ecosystem
[๐๐ฟ๐๐ถ๐ฐ๐น๐ฒ] ๐ ๐ถ๐ฐ๐ฟ๐ผ๐๐ผ๐ณ๐ ๐ญ๐ฒ๐ฟ๐ผ ๐ง๐ฟ๐๐๐ ๐ฑ๐ฒ๐ฝ๐น๐ผ๐๐บ๐ฒ๐ป๐ ๐ด๐๐ถ๐ฑ๐ฒ ๐ณ๐ผ๐ฟ ๐๐ผ๐๐ฟ ๐ฎ๐ฝ๐ฝ๐น๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป๐
[Article]What we learned when moving to Zero Trust Network Architecture at Microsoft
[๐๐ฟ๐๐ถ๐ฐ๐น๐ฒ] ๐๐ถ๐ด๐ถ๐๐ฎ๐น ๐ฒ๐บ๐ฝ๐ฎ๐๐ต๐ ๐๐ต๐ผ๐๐น๐ฑ ๐ด๐๐ถ๐ฑ๐ฒ ๐๐ผ๐๐ฟ ๐ญ๐ฒ๐ฟ๐ผ ๐ง๐ฟ๐๐๐ ๐ถ๐บ๐ฝ๐น๐ฒ๐บ๐ฒ๐ป๐๐ฎ๐๐ถ๐ผ๐ป
[Article]Supply Chain Risk Management for Zero Trust with Microsoft Azure (6 of 6)
A new, great sample blueprint is here! [News] New Azure Security Benchmark Foundation helps organizations embrace zero trust https://devblogs.microsoft.com/azuregov/new-azure-security-benchmark-foundation-helps-organizations-embrace-zero-trust/
Consolidated information for securing the Cloud perimeter [Article] Microsoft Ignite 2019 โ Securing Your Cloud Perimeter With Azure Network Security
#Azure #CyberSecurity #Firewall #Zerotrust
[Article] In a Zero Trust World, Compliance Doesnโt Equal Security https://nextgov.com/ideas/2020/12/zero-trust-world-compliance-doesnt-equal-security/171046/
MODULE #3: CYBERSECURITY MATURITY MODEL COMPLIANCE (CMMC)
Cybersecurity Maturity Model Certification (CMMC) is a new standard introduced by the US Department of Defense (DoD), which is intended to measure and certify Defense Industrial Base (DIB) contractorsโ ability to safeguard Federal Contract Information (FCI) and Controlled Unclassified Information (CUI) in accordance with Defense Federal Acquisition Regulation Supplement (DFARS) Clause 252.204-7012 regulations.
- Level-100: Microsoft Product Placemat for CMMC
- Level-200: Technical Guide
The guide is organized in sections for each of the domains of CMMC L3, beginning with Access Control:
LEVEL-3 COMPLIANCE
Meeting CMMC L3 on Azure using Blueprints, Policies and Security Compliance Dashboard
[Article]Meeting CMMC Level 3 on Azure
Azure Sentinel Cybersecurity Maturity Model Certification (CMMC) Workbook
The Azure Sentinel CMMC Workbook provides a mechanism for viewing log queries aligned to CMMC controls across the Azure cloud including Microsoft security offerings, Office 365, Teams, Intune, Windows Virtual Desktop and many more. This workbook enables Security Architects, Engineers, SecOps Analysts, Managers, and IT Pros to gain situational awareness for the security posture of cloud workloads. There are also recommendations for selecting, designing, deploying, and configuring Microsoft offerings for alignment with respective CMMC requirements and practices. The workbook features 250+ control cards aligned to the 17 CMMC control families across all 5 maturity levels with selectable GUI buttons for navigation.
Microsoft Product Placemat for CMMC
The Microsoft Product Placemat for Cybersecurity Maturity Model Certification (CMMC) Level 3 (Preview) is an interactive view representing how Microsoft cloud products and services may satisfy requirements for CMMC practices.
The Microsoft Product Placemat for CMMC is especially useful when paired with the Microsoft Technical Reference Guide for CMMC. The Technical Reference Guide
Microsoft CMMC Acceleration Program
Microsoft is actively building out their CMMC program by developing resources for both partners and Defense Industrial Base (DIB) companies to leverage in their Cybersecurity Maturity Model Certification (CMMC) journey. These tools cannot guarantee a positive CMMC adjudication, but they may assist candidate organizations by improving their CMMC posture by going into a formal CMMC review in accordance with CMMC Accreditation Body standards.
While Microsoft is planning to release their resources and guidance in waves, please keep in mind that they are dependent upon the CMMC Accreditation Body finalizing the CMMC guidance itself.
Microsoft CMMC Acceleration Program
#CMMC #MicrosoftAzure #CyberSecurity #AzurePolicies #CloudSecurity