Category: Azure

Section 3 – Design a Zero Trust strategy and architecture – Design an identity security strategy

And onward to the next section in my SC-100 study guide: Note: includes hybrid and multi-cloud scenarios! Design a strategy for access to cloud resources Recommend an identity store (tenants, B2B, B2C, hybrid) Recommend an authentication strategy Recommend an authorization…

Continue Reading Section 3 – Design a Zero Trust strategy and architecture – Design an identity security strategy

Microsoft Entra Verified ID went GA!

Back in 2018 Microsoft joined ID2020 alliance and started collaborating with Accenture and Avanade on a blockchain-based identity prototype for Azure. The intention was to give people means to identify them selves easily. And finally Yesterday Microsoft released the final product!…

Continue Reading Microsoft Entra Verified ID went GA!

Microsoft Defender for Cloud Apps in Microsoft 365 Defender (Preview)

Microsoft is all the time consolidating their various different portals, they already removed multiple portals during recent years. Here is a full list of the current ones, sigh! Turn on Preview features Required permissions Accounts assigned the following Azure Active…

Continue Reading Microsoft Defender for Cloud Apps in Microsoft 365 Defender (Preview)

Section 2 – Design a Zero Trust strategy and architecture – Design a security operations strategy

And time for the second section for my SC-100 study guide: Design a logging and auditing strategy to support security operations Develop security operations to support a hybrid or multi-cloud environment Design a strategy for SIEM and SOAR Evaluate security…

Continue Reading Section 2 – Design a Zero Trust strategy and architecture – Design a security operations strategy

Mover.io retirement

History of Mover.io Mover used Bifrost agent to connect to bifrost-v2.mover.io with port 443 Microsoft aquired Mover.io back in 2019 Many of you have been using Mover.io for data migrations, either for your organization or just for personal content. Either…

Continue Reading Mover.io retirement

Section 1 – Design a Zero Trust strategy and architecture – Build an overall security strategy and architecture

The first section for SC-100 study will contain: Identify the integration points in an architecture by using Microsoft Cybersecurity Reference Architecture (MCRA) Translate business goals into security requirements Translate security requirements into technical capabilities, including security services, security products, and…

Continue Reading Section 1 – Design a Zero Trust strategy and architecture – Build an overall security strategy and architecture

Exam cram for Cybersecurity Architect exam

When I wrote the study guide for AZ-500, I was planning to write a study guide for MS-500, SC-400 or AZ-104 but when I saw the contents of SC-100, I decided differently. For AZ-500 I counted 12 parts but now…

Continue Reading Exam cram for Cybersecurity Architect exam

Azure Enterprise-scale or Resource groups?

In this post I will be comparing the two different options, Azure Resource Management and Resource groups. These two are fundamentally different although they have the same functions for the resources. But first let’s go thru the cloud journey you…

Continue Reading Azure Enterprise-scale or Resource groups?

Microsoft Entra Permissions Management

Entra has combined three existing solutions under entra.microsoft.com: Azure Active Directory (Azure AD)  Multicloud identity and access management solution with integrated security.  Microsoft Entra Permissions Management​  One unified model to manage permissions ​of any identity across any cloud.  Microsoft Entra Verified ID​ …

Continue Reading Microsoft Entra Permissions Management

Section 15 – Secure data and applications – Configure and manage Azure Key Vault

And here goes the last section in my AZ-500 study guide, the end is coming with: Create and configure Key Vault Configure access to Key Vault Manage certificates, secrets, and keys Configure key rotation Configure Backup and recovery of certificates,…

Continue Reading Section 15 – Secure data and applications – Configure and manage Azure Key Vault