<p><span>Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Gain a deep understanding of all topics covered in the SC-100 exam</span></span></li><li><span><span>Benefit from prac
Microsoft Cybersecurity Architect Exam Ref SC-100: Get certified with ease while learning how to develop highly effective cybersecurity strategies
โ Scribed by Dwayne Natwick
- Publisher
- Packt Publishing
- Year
- 2023
- Tongue
- English
- Leaves
- 273
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges
Key Features
- Gain a deep understanding of all topics covered in the SC-100 exam
- Benefit from practical examples that will help you put your new knowledge to work
- Design a zero-trust architecture and strategies for data, applications, access management, identity, and infrastructure
Book Description
Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Complete with hands-on tutorials, projects, and self-assessment questions, you'll have everything you need to pass the SC-100 exam.
This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture. This will include cloud-only and hybrid infrastructures, where you'll learn how to protect using the principles of zero trust, along with evaluating security operations and the overall security posture. To make sure that you are able to take the SC-100 exam with confidence, the last chapter of this book will let you test your knowledge with a mock exam and practice questions.
By the end of this book, you'll have the knowledge you need to plan, design, and evaluate cybersecurity for Microsoft cloud and hybrid infrastructures, and pass the SC-100 exam with flying colors.
What you will learn
- Design a zero-trust strategy and architecture
- Evaluate GRC technical strategies and security operations strategies
- Design security for infrastructure
- Develop a strategy for data and applications
- Understand everything you need to pass the SC-100 exam with ease
- Use mock exams and sample questions to prepare for the structure of the exam
Who this book is for
This book is for a wide variety of cybersecurity professionals โ from security engineers and cybersecurity architects to Microsoft 365 administrators, user and identity administrators, infrastructure administrators, cloud security engineers, and other IT professionals preparing to take the SC-100 exam. It's also a good resource for those designing cybersecurity architecture without preparing for the exam. To get started, you'll need a solid understanding of the fundamental services within Microsoft 365, and Azure, along with knowledge of security, compliance, and identity capabilities in Microsoft and hybrid architectures.
Table of Contents
- Cybersecurity in the Cloud
- Building an Overall Security Strategy and Architecture
- Designing a Security Operations Strategy
- Designing an Identity Security Strategy
- Designing a Regulatory Compliance Strategy
- Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk
- Designing a Strategy for Securing Server and Client Endpoints
- Designing a Strategy for Securing SaaS, PaaS, and IaaS
- Specifying Security Requirements for Applications
- Designing a Strategy for Securing Data
- Case Study Responses and Final Assessment/Mock Exam
- Appendix: Preparing for Your Microsoft Exam
โฆ Table of Contents
Cover
Title Page
Copyright and Credits
Foreword
Contributors
Table of Contents
Preface
Part 1: The Evolution of Cybersecurity in the Cloud
Chapter 1: Cybersecurity in the Cloud
What is cybersecurity?
Evolution of cybersecurity from on-premises to the cloud
Defense-in-depth security strategy
Building a defense-in-depth security posture
Shared responsibility in cloud security
Cybersecurity architecture use cases
Security operations
Understanding the stages of a cyber attack
Understanding the scope of cybersecurity in the cloud
Shared responsibility scope
Principles of the zero-trust methodology
Common threats and attacks
Internal threats
External threats
Summary
Part 2: Designing a Zero-Trust Strategy and Architecture
Chapter 2: Building an Overall Security Strategy and Architecture
Identifying the integration points in an architecture by using the Microsoft Cybersecurity Reference Architecture
How are the MCRA used?
What are the components of the MCRA?
Translating business goals into security requirements
Threat analysis
Translating security requirements into technical capabilities
Physical
Identity and access
Perimeter security
Network security
Compute
Applications
Data
Designing security for a resiliency strategy
Integrating a hybrid or multi-tenant environment into a security strategy
Developing a technical and governance strategy for traffic filtering and segmentation
Summary
Chapter 3: Designing a Security Operations Strategy
Designing a logging and auditing strategy to support security operations
Security operations overview
Microsoft security operations tools
Logging and auditing for threat and vulnerability detection
Developing security operations to support a hybrid or multi-cloud environment
Designing a strategy for SIEM and SOAR
Evaluating security workflows
Security strategies for incident management and response
Security workflows
Evaluating a security operations strategy for the incident management life cycle
Evaluating a security operations strategy for sharing technical threat intelligence
Summary
Chapter 4: Designing an Identity Security Strategy
Zero Trust for identity and access management
Designing a strategy for access to cloud resources
Recommending an identity store
Azure AD tenant synchronization with SCIM
B2B
B2C
Recommending an authentication and authorization strategy
Hybrid identity infrastructure
Secure authorization methods
Designing a strategy for CA
Designing a strategy for role assignment and delegation
Designing a security strategy for privileged role access
Azure AD PIM
Designing a security strategy for privileged activities
Privileged access reviews
Entitlement management (aka permission management)
Cloud tenant administration
Case study โ designing a Zero Trust architecture
Summary
Part 3: Evaluating Governance, Risk, and Compliance (GRC) Technical Strategies and Security Operations Strategies
Chapter 5: Designing a Regulatory Compliance Strategy
Interpreting compliance requirements and translating them into specific technical capabilities
Evaluating infrastructure compliance by using Microsoft Defender for Cloud
Interpreting compliance scores and recommending actions to resolve issues or improve security
Designing the implementation of Azure Policy
Designing for data residency requirements
Translating privacy requirements into requirements for security solutions
Case study โ designing for regulatory compliance
Summary
Chapter 6: Evaluating the Security Posture and Recommending Technical Strategies to Manage Risk
Evaluating the security posture by using benchmarks
Evaluating the security posture by using Microsoft Defender for Cloud
Evaluating the security posture by using Secure Scores
Evaluating the security posture of cloud workloads
Designing security for an Azure Landing Zone
Interpreting technical threat intelligence and recommending risk mitigations
Recommending security capabilities or controls to mitigate identified risks
Case study โ evaluating the security posture
Summary
Part 4: Designing Security for Infrastructure
Chapter 7: Designing a Strategy for Securing Server and Client Endpoints
Planning and implementing a security strategy across teams
Specifying security baselines for server and client endpoints
Specifying security requirements for servers, including multiple platforms and operating systems
Specifying security requirements for mobile devices and clients, including endpoint protection, hardening, and configuration
Specifying requirements to secure AD DS
Designing a strategy to manage secrets, keys, and certificates
Designing a strategy for secure remote access
Understanding security operations frameworks, processes, and procedures
Case study โ designing a secure architecture for endpoints
Summary
Chapter 8: Designing a Strategy for Securing SaaS, PaaS, and IaaS
Specifying security baselines for SaaS, PaaS, and IaaS services
Security baselines for SaaS
Security baselines for IaaS
Security baselines for PaaS
Specifying security requirements for IoT workloads
Specifying security requirements for data workloads, including SQL, Azure SQL Database, Azure Synapse, and Azure Cosmos DB
Specifying security requirements for storage workloads, including Azure Storage
Specifying security requirements for web workloads, including Azure App Service
Specifying security requirements for containers
Specifying security requirements for container orchestration
Case study โ security requirements for IaaS, PaaS, and SaaS
Summary
Part 5: Designing a Strategy for Data and Applications
Chapter 9: Specifying Security Requirements for Applications
Specifying priorities for mitigating threats to applications
Identity and secrets handling and use
Segmentation and configuration
Static and dynamic testing
Data handling and access
Security posture management and workload protection
Specifying a security standard for onboarding a new application
Specifying a security strategy for applications and APIs
Case study โ security requirements for applications
Summary
Chapter 10: Designing a Strategy for Securing Data
Specifying priorities for mitigating threats to data
Managing the risk to data
Ransomware protection and recovery
Designing a strategy to identify and protect sensitive data
Specifying an encryption standard for data at rest and in motion
Encryption at rest
Encryption in transit
Identity and secrets handling and use
Case study โ designing a strategy to secure data
Summary
Chapter 11: Case Study Responses and Final Assessment/Mock Exam
Case study sample responses
Chapter 4 โ designing a zero-trust architecture
Chapter 5 โ designing for regulatory compliance
Chapter 6 โ evaluating the security posture
Chapter 7 โ designing a secure architecture for endpoints
Chapter 8 โ security requirements for IaaS, PaaS, and SaaS
Chapter 9 โ security requirements for applications
Chapter 10 โ designing a strategy to secure data
Mock exam practice questions
Questions
Mock exam answers and chapter reference
Summary
Appendix: Preparing for Your Microsoft Exam
Technical requirements
Preparing for a Microsoft exam
Resources to prepare for the exam
Access to a subscription
Where to take the exam
Exam format
Resources available and accessing Microsoft Learn
Accessing Microsoft Learn
Finding content on Microsoft Learn
Exam pages on Microsoft Learn
Creating a Microsoft 365 trial subscription
Office 365 or Microsoft 365 trial subscription
Enterprise Mobility + Security subscription
Setting up a free month of Azure services
Exam objectives
Who should take the SC-100 exam?
Summary
Index
Other Books You May Enjoy
๐ SIMILAR VOLUMES
<p><span>Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges</span></p><h4><span>Key Features</span></h4><ul><li><span><span>Gain a deep understanding of all topics covered in the SC-100 exam</span></span></li><li><span><span>Benefit from prac
<p><span>Prepare for Microsoft Exam SC-100</span><span> and demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking
<p><span>Prepare for Microsoft Exam SC-100</span><span> and demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking
<p><span>Prepare for Microsoft Exam SC-100</span><span> and demonstrate your real-world mastery of skills and knowledge needed to design and evolve cybersecurity strategy for all aspects of enterprise architecture. Designed for experienced IT professionals, this Exam Ref focuses on critical thinking
Prep for the SC-100 exam like a pro with Sybex' latest Study Guide In the MCE Microsoft Certified Expert Cybersecurity Architect Study Guide: Exam SC-100, a team of dedicated software architects delivers an authoritative and easy-to-follow guide to preparing for the SC-100 Cybersecurity Architect