filmov
tv
Azure Well Architected Framework: Security
Показать описание
Use the Microsoft Zero Trust model as a guide:
• Check carefully to make sure only the right people are doing what they're supposed to do, from where they should be doing it. This step makes it harder for hackers to pretend to be legitimate users. You need to verify explicitly with all the data points , even simple MFA protects you from 99% of identity related threats.
• Give people the least amount of access they need, for only as long as they need it, to the things they really need to access. This approach stops hackers from using permissions they shouldn't have. We call it least privilege principle this saves you from human errors as well.
• Always assume your security could be breached and have backup plans that reduce the risk and damage if your main defenses fail. This way, you're always one step ahead of hackers. You need to assume breach and them put controls that limit risks “blast radius”
My name is Arun Pachehra and i am an IT Professional & a fitness enthusiast. Its been more than 12 years working with various technologies and now i am planning to share with you all. As per plan i am going to publish the entire Az 303 series first and if things would go as planned then a lot of stuff would come your way including Q&A , Production issues and various interesting stuff.
• Check carefully to make sure only the right people are doing what they're supposed to do, from where they should be doing it. This step makes it harder for hackers to pretend to be legitimate users. You need to verify explicitly with all the data points , even simple MFA protects you from 99% of identity related threats.
• Give people the least amount of access they need, for only as long as they need it, to the things they really need to access. This approach stops hackers from using permissions they shouldn't have. We call it least privilege principle this saves you from human errors as well.
• Always assume your security could be breached and have backup plans that reduce the risk and damage if your main defenses fail. This way, you're always one step ahead of hackers. You need to assume breach and them put controls that limit risks “blast radius”
My name is Arun Pachehra and i am an IT Professional & a fitness enthusiast. Its been more than 12 years working with various technologies and now i am planning to share with you all. As per plan i am going to publish the entire Az 303 series first and if things would go as planned then a lot of stuff would come your way including Q&A , Production issues and various interesting stuff.
Комментарии