SC-100: Security Best Practices Flashcards
(34 cards)
What are the guiding principles of Zero Trust?
Verify Explicitly
Use Least Priviledge Access
Assume Breach
Azure Well-Architected Framework
A framework designed to help customers build secure, high-performing, resilient, and efficient infrastructure for their applications and workloads in Azure.
Five Pillars:
Cost Optimization
Operational Excellence
Performance Efficiency
Reliability
Security
Azure Well-Architected Framework’s
Five Pillars!
Cost Optimization
Operational Excellence
Performance Efficiency
Reliability
Security
Which of the following is a key principle of Azure’s Well-Architected Framework?
Plan for failure!
Planning for potential problems and creating resilient systems that can withstand failures without significant downtime or data loss.
Azure’s Well Architected Framework pillars of IoT!
Strong Identity
Least Privilege
Device Health
Device Update
Monitor System Security/Plan Incident response
Microsoft Cloud Adoption Framework
A documentation and implementation framework for best practices throughout the cloud adoption lifecycle, providing a step-by-step approach to cloud migration and management using Azure.
Microsoft Cloud Adoption Framework Steps!
Define Strategy
Plan
Ready
Adopt (Migrate, modernize, innovate)
Secure
Manage
Govern
What is the purpose of the Cloud Adoption Framework?
To help organizations build secure applications and infrastructure in the cloud.
The Cloud Adoption Framework helps organizations to design, deploy, and operate workloads that are consistent with their business objectives and meet security and compliance requirements.
What are Azure Landing Zones?
Azure Landing Zones provide an automated and prescriptive reference implementation to rapidly set up a comprehensive secure cloud baseline
A well-defined, structured environment within Azure that serves as a starting point for migrating, modernizing, and innovating applications at scale.
Microsoft Cybersecurity Reference Architectures (MCRA)
A set of technical diagrams that describes Microsoft’s cybersecurity capabilities. Show how Microsoft security capabilities integrate with the following:
-Microsft platforms like Microspft 365 and Azure
-Third party apps like ServiceNow and Salesforce
-Third part platforms like AWS and Google Cloud Platform (GCP)
Microsoft Cybersecurity Reference Architectures (MCRA) contain diagrams on the following:
Microsoft cybersecurity capabilities
Zero Trust and Zero Trust Rapid Modernization Plan (RaMP)
Zero Trust User Access
Security Operations
Operational Technology (OT)
Multicloud and cross-platform capabilities
Attack chain coverage
Azure native security controls
Security organizational functions
Which of the following best defines the objective of a cloud reference architecture like Microsoft Cybersecurity Reference Architecture (MCRA) from Microsoft?
MCRA is designed to provide security-focuses reference architecture guidance that can apply almost anywhere no matter what underlying technologies, workloads, or data types are involved.
What is a key benfit of using best practices, such as those found in the Microsoft Cybersecurity Reference Architecture (MCRA) when addressing cloud security concerns?
Using best practices can reduce staffing needs, complexity, and risk exposure, bringing financial benefits that arise from economies of reuse and simplification rather than reducing the number of platforms, components or architectures alone.
Microsoft Cloud Security Benchmark (MCSB)
A framework for assessing the security posture of an organization;s cloud environment against industry standards and best practices
Microsoft Cloud Security Benchmark (MCSB) domains/control families
Network Security
Identity Management
Privileged Access
Data Protection
Asset Management
Logging and Threat Detection
Incident Response
Posture and Vulnerability Management
Endpoint Security
Backup and Recovery
DevOps Security
Governance and Strategy
Control
A control is a high-level description of a feature or activity that needs to be addressed and isn’t specific to a technology or implementation
Example: Data Protection is one of the security control families. Data Protection contains specific actions that must be addressed to help ensure data is protected
Baseline
The implementation of the Control on the individual Azure services. Each organization dictates a benchmark recommendation and corresponding configuration needed in Azure.
Example: The Contoso Company looks to enable Azure SQL security features by following the configuration recommendation in the Azure SQL security baseline
What is the purpose of the Microsoft Cloud Security Benchmark (MCSB)?
It is designed to provide a set of recommended security configurations and best practices for Microsoft cloud services.
What is the difference between defensive and detective security controls, as discussed in the Microsoft Cloud Security Benchmark (MCSB)?
Defensive controls proactively prevent security incidents while Detective controls detect and respond to these incidents after they occur.
What are attack vectors?
An attack vector is an entry point or route for an attacker to gain access to a system.
Examples include: Email, social media, insiders, removable devices, browsers, cloud services, devices, wifi
What is a security breach?
Any attack that results in someone gaining unauthorized access to devices, services, or networks.
What are data breaches?
A data breach is when an attacker successfully gains access or control of data.
Attack Chain Modeling
An attack chain describes the typical chain of events uring an attack that leads to organizational damage. This includes technical and non-technical steps taken by adversaries or insiders during the attack.
Microsoft’s best practices for ransomware protection
- Prepare your recovery plan
- Limit the scope of the damage
- Make it hard to get in