All that you know about on-premises security still applies, and much of it is also relevant in the cloud – but there new issues, and new perspectives on established issues, that can help be more effective at protecting your data.
To help you get that knowledge, we’ve put together a great course: Security in a Cloud Enabled World.
In it you’ll learn what Microsoft has learned from responding to customer cybersecurity incidents and from helping customers to defend their cloud assets and to manage the shared security responsibility for cloud services.
Mark Simos from Microsoft Consulting Services and Tim Rains, Chief Security Advisor, Microsoft Worldwide Cybersecurity & Data Protection, lead you through the customer responsibility roadmap in the Microsoft Cloud Security for Enterprise Architects poster and provide recommendations for modernizing each part of your security posture, including governance, containment strategies, security operations, high-value asset protection, information protection, and user and device security, with a particular emphases on protecting administrative control.
Learn from the same framework that the Microsoft cybersecurity team uses to assess customers’ cloud security and to build them a security roadmap.
The course include the following sections:
1 | Introduction and Overview
Hear how the increase in cybersecurity threats and cloud technology has upended a lot of conventional wisdom around computer security.
2 | Trustworthy Cloud Provider
Tim Rains and Mark Simos for a look at the Microsoft commitment to earn customer and partner trust in its cloud services, with a focus on privacy controls, compliance, and certification.
3 | Roadmap 1: Security Strategy, Governance, and Operationalization
Learn about attacker methods, strategic imperatives, hallmarks of good security policy, managing continuous innovative threats, and modernizing a modern security zone and containment strategy.
4 | Roadmap 2: Administrative Control
Take a look at the challenges, strategies, and technologies for administrative control and to help prevent your cloud assets from being compromised.
5 | Roadmap 3: Information and Data Security
Learn about the challenges with protecting information in a modern enterprise and the strategies and technologies to protect your most important business information.
6 | Roadmap 4: User Identity and Device Security
Since user accounts and devices are on the front line of attacks and, in aggregate, have access to most of your corporate assets, learn about strategies and technologies to bolster their protections
7 | Roadmaps 5-8: Application, Network, OS, and Fabric Security
Since many enterprises operate a hybrid of cloud and on-premises assets, explore aspects of security for these layers of the stack and a simple threat model approach to discover and prioritize risks.
8 | Summary
Wrap up with a summary of the most important concepts and recommendations in the course.