[SC-100] Conditional Access frameworks, policies, and naming conventions

August 09, 2023

OK, OK, so it may not necessarily be the most interesting topic...

Nevertheless, I think this article from Microsoft on Conditional Access framework and policies is an important one.

Of particular note, there's a section on naming conventions and how to develop/establish a system that scales well for designating . . .

Read More

[SC-100] The Seven Properties of Highly Secure Devices

August 07, 2023

Great read from Microsoft: The Seven Properties of Highly Secure Devices.

This doc delves into architectural considerations for designing IoT systems that have security baked in. Good stuff!

Read More

[SC-100] Microsoft Entra "Verified ID" Feature Explained

August 06, 2023

In case I'm not the only person who as a little unfamiliar with Microsoft's "Verified ID" feature, I came across a great video from Andy Malone that walks through a practical example of how it works.

Here's a high-level diagram as well:

Very interesting and compelling. I think remains to be . . .

Read More

[SC-100] Identity is more than a username

August 06, 2023

While studying for the SC-100 exam, a concept really resonated with me: the definition of identity and its purpose in security.

I think for some folks (myself included), it's been all too easy to think of "identity" as a singular credential; a unique data element. Like an ID card. While understandable, I think that . . .

Read More

Trivial terminology: MITRE vs MITRE Engenuity?

What's the difference?

August 05, 2023

I like this succinct explanation from Check Point on the difference between "MITRE" and "MITRE Engenuity". Good stuff.

The MITRE Corporation is a US Government federally funded research and development center (FFRDC), and the MITRE Engenuity is a foundation dedicated to using the research and technology . . .

Read More

[SC-100] NIST 800-61 response management phases

August 05, 2023

I'm digging this simple (but functional!) illustration of the NIST 800-161 response management phases, courtesy of Microsoft Learning:

Good stuff!

Read More

[SC-100] Simplified explanation of technical response to incidents

August 05, 2023

While perusing a study guide for SC-100 exam, I came across a really nice and succinct explanation for technical response. It's one of my favorite quotes now:

(...) there are two key goals that every incident response should aim to address from a technical perspective. The first is identifying the scope of the attack (...) . . .

Read More

Archive
   Subscribe by email and never miss a post.

This update link alerts you to new Silvrback admin blog posts. A green bubble beside the link indicates a new post. Click the link to the admin blog and the bubble disappears.

Got It!