From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Unlock this course with a free trial
Join today to access over 25,500 courses taught by industry experts.
Evaluate security of cloud workloads
From the course: Microsoft Cybersecurity Architect (SC-100) Cert Prep by Microsoft Press
Evaluate security of cloud workloads
Part of being able to evaluate the security posture of your cloud workload includes simply understanding what needs to be managed and putting the details in place. For the application itself, there should be a workload or application owner that is responsible for the individual security components of their application. This could be code level security, ensuring encryption, as used appropriately, that the access to data is secure and more. The CISO or CIO should be responsible for the organization all up. This includes internal and external identities, device security and cross-workload security. The IT security team will then implement the required monitoring controls to ensure compliance and investigate any generated alerts or incidents.
Contents
-
-
-
-
-
-
-
(Locked)
Learning objectives42s
-
(Locked)
Evaluate security using benchmarks1m 1s
-
(Locked)
Evaluate security using Defender2m 36s
-
(Locked)
Evaluate security using Secure Score41s
-
(Locked)
Evaluate security of cloud workloads57s
-
(Locked)
Design security with landing zones1m 53s
-
(Locked)
Interpret threat intelligence35s
-
(Locked)
Mitigate identified risks1m 8s
-
(Locked)
-
-
-
-
-