Cybersecurity Resources - New Generation - Focused Cloud - Ecosystem focused Microsoft
Janvier 2020
-
Added Link to YouTube playlist for on Azure Security Compass page
-
Upcoming Ignite Session on Top 10 Azure Security Best Practice
-
Added Zero Trust Resources section (and re-ordered sections)
-
Added recent entries in CDOC Blog Series - Part 1 | Part 2a | Part 2b | Part 3a
-
Release of Azure Security Compass Slides - https://aka.ms/AzureSecurityCompass
-
Released Azure Security Architecture Guidance (similar to AWS well-architected framework) - https://aka.ms/AzureSecurityArchitecture
- Blog Series - Part 1 | Part 2a | Part 2b | Part 3a
- Video from Microsoft’s Virtual Security Summit (starting at 1:05:48) - https://info.microsoft.com/US-SCRTY-WBNR-FY19-04Apr-16-01MasterTheVirtualSecuritySummit-MCW0012180_02OnDemandRegistration-ForminBody.html
- Poster - https://aka.ms/minutesmatter
- Zero Trust Landing Page – Overview and links to resources, assessments, etc.
- CISO Workshop Slides/Videos – Zero Trust strategy and application to modern identity architecture
- Microsoft’s IT Learnings - from (ongoing) Zero Trust journey
- [Vision Paper](https://download.microsoft.com/download/f/9/2/f92129bc-0d6e-4b8e-a47b-288432bae68e/Zero_Trust_Vision_Paper_Final 10.28.pdf) – Microsoft’s maturity model describing the Zero Trust journey
- eBook – summarizing dynamics of Zero Trust and how Microsoft technology supports it today
Microsoft's learnings and recommended strategies for Threat Protection, Identity & Access Management, Security Management, and Information Protection. Slides for many of the other resources below are also in the CISO Workshop)
- Videos and Slide Download (including detailed notes) - https://aka.ms/CISOWorkshop
- Reference Architecture Slides - http://aka.ms/mcra
- Mapping to NIST CSF and ISO 27001 - https://aka.ms/CyberMapping
- Your Pa$$word Doesn't Matter - https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Your-Pa-word-doesn-t-matter/ba-p/731984
- Azure Security Compass (and tracking spreadsheets) - https://aka.ms/azuresecuritycompass
- Security Architecture Guidance (similar to AWS well-architected framework) - https://aka.ms/AzureSecurityArchitecture
- Security Documentation - http://aka.ms/AzureSecInfo
- Feature Updates - https://azure.microsoft.com/en-us/updates/?status=all
Microsoft's cloud native SIEM and SOAR capability (currently in Preview)
- Documentation - https://docs.microsoft.com/en-us/azure/sentinel/
- Project VAST dashboard - https://blogs.technet.microsoft.com/jonsh/azure-sentinel-insecure-protocols-dashboard-setup/
Roadmap of security recommendations for protecting Office 365 against top attacks and prioritize by things to do in the first 30 days, first 90 days and beyond.
- Recommendation Roadmap - https://aka.ms/O365SecRoadmap
- Microsoft Ignite Session - Secure Office 365 like a cybersecurity pro: - http://aka.ms/o365secroadmap
- Feature updates - https://www.microsoft.com/en-us/microsoft-365/roadmap?filters=
Roadmap of recommendations to protect against these attacks (30 days, 90 days, and beyond) put together by Microsoft, NIST, CIS, and DHS NCCIC (formerly US-CERT)
- Webinar - https://aka.ms/rapidattack-webinar
- Download slides (including detailed notes) - https://aka.ms/rapidattack-slides
- Security Return on Investment (ROI) Video (1.5 minutes) - https://www.youtube.com/watch?v=maQh35MdFKY
- Cyber Resilience - https://www.youtube.com/watch?v=Dho2qypPsNg
The Secure DevOps Toolkit for Azure (AZSK) is the set of documentation and scripts that Microsoft's IT organization used to secure the DevOps process on Azure
- Website - https://azsk.azurewebsites.net/
- Microsoft's Detection and Response Team (DART) - https://aka.ms/DART
- IR Lessons learned and recommendations - Microsoft worked with EY, Edelman, and Orrick to build guidance based on our collective experience working with different aspects of major incidents (technical, operational, legal, and communications) - https://aka.ms/IRRG
- NIST Guide for Cybersecurity Event Recovery - https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-184.pdf
Recommended roadmap for securing privileged access
- Roadmap - Prescriptive roadmap of steps in priority order (first 30 days, 90 days, and beyond) - http://aka.ms/SPAroadmap
- Credential Theft Demonstration (~10 minutes) - http://aka.ms/credtheftdemo
- RSA Conference Presentation - Co-presentation with Tony Sager of the Center for Internet Security (CIS) on this aspect of critical hygiene - https://aka.ms/criticalhygiene-rsac