SC100 Design a Zero Trust strategy and architecture
vaughan mason - 2022-04-20Design a Zero Trust strategy and architecture (30–35%)
Build an overall security strategy and architecture
- identify the integration points in an architecture by using Microsoft Cybersecurity Reference Architecture (MCRA)
- translate business goals into security requirements
- translate security requirements into technical capabilities, including security services, security products, and security processes
- design security for a resiliency strategy
- integrate a hybrid or multi-tenant environment into a security strategy
- develop a technical and governance strategy for traffic filtering and segmentation
Useful Links
Design a security operations strategy
- design a logging and auditing strategy to support security operations
- develop security operations to support a hybrid or multi-cloud environment
- design a strategy for SIEM and SOAR
- evaluate security workflows
- evaluate a security operations strategy for incident management lifecycle
- evaluate a security operations strategy for sharing technical threat intelligence
Useful Links
Design an identity security strategy
Note: includes hybrid and multi-cloud
- design a strategy for access to cloud resources
- recommend an identity store (tenants, B2B, B2C, hybrid)
- recommend an authentication strategy
- recommend an authorization strategy
- design a strategy for conditional access
- design a strategy for role assignment and delegation
- design security strategy for privileged role access to infrastructure including identity based firewall rules, Azure PIM
- design security strategy for privileged activities including PAM, entitlement management, cloud tenant administration
Useful Links
Go Back
This page was last updated at 2022-04-21
If you don't agree with the content on this page, please click here