[SC-100] Defender for Cloud - Recommendations vs Alerts vs Vulnerability Assessment

August 13, 2023

Maybe it's just me, but I was starting to get a little confused on the differences in Azure workload security options. There's essentially three elements:

  • "Security Recommendations"
  • "Alerts"
  • "Vulnerability Assessment"

What's the difference though? Just for the heck . . .

Read More

[SC-100] CWPP vs CSPM

Gotta love acronyms and abbreviations, right?

August 12, 2023

While studying for the SC-100, there's a few terms that kept coming up:

  • "Cloud Workload Protection Platform" (CWPP)
  • "Cloud Security Posture Management" (CSPM)

I can infer some context based on the names but I was curious to know exactly what the difference was between them. Thankfully, . . .

Read More

[SC-100] MCSB Compliance Control Overview

August 12, 2023

Just a note and friendly reminder that summaries for the Microsoft Cloud Security Benchmark (MCSB) control domains are available here. The table on this page does a great job of summarizing what each of the domains do.

Read More

[SC-100] Security and agility

August 10, 2023

Another gem from SC-100 study material. Admittedly a little obvious but the thought is expressed very well.

Security needs to become more agile because businesses, government agencies, and other organizations today face a world where services are expected to be provided whenever and wherever people want them.

(Source: . . .

Read More

[SC-100] Compliance is not security

August 10, 2023

I came across this gem in sc-100 prep material:

While compliance provides a consistent required baseline of security best practices and controls, compliance with security standards is insufficient to make an organization "secure". Keeping an organization secure can change dynamically by the week, day, or hour as . . .

Read More

[SC-100] Conditional Access frameworks, policies, and naming conventions

August 09, 2023

OK, OK, so it may not necessarily be the most interesting topic...

Nevertheless, I think this article from Microsoft on Conditional Access framework and policies is an important one.

Of particular note, there's a section on naming conventions and how to develop/establish a system that scales well for designating . . .

Read More

[SC-100] The Seven Properties of Highly Secure Devices

August 07, 2023

Great read from Microsoft: The Seven Properties of Highly Secure Devices.

This doc delves into architectural considerations for designing IoT systems that have security baked in. Good stuff!

Read More

Archive
   Subscribe by email and never miss a post.

This update link alerts you to new Silvrback admin blog posts. A green bubble beside the link indicates a new post. Click the link to the admin blog and the bubble disappears.

Got It!