From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press

Unlock this course with a free trial

Join today to access over 25,500 courses taught by industry experts.

Evaluate security of cloud workloads

Evaluate security of cloud workloads

Part of being able to evaluate the security posture of your cloud workload includes simply understanding what needs to be managed and putting the details in place. For the application itself, there should be a workload or application owner that is responsible for the individual security components of their application. This could be code level security, ensuring encryption, as used appropriately, that the access to data is secure and more. The CISO or CIO should be responsible for the organization all up. This includes internal and external identities, device security and cross-workload security. The IT security team will then implement the required monitoring controls to ensure compliance and investigate any generated alerts or incidents.

Contents