Concepts of security, compliance, and identity Flashcards
Zero Trust model’s foundational pillars
INDDIA
Identities
Networks
Devices
Data
Infrastructure
Applications
What is the Microsoft Cloud Adoption Framework for Azure?
It provides best practices from Microsoft employees, partners, and customers including tools and guidance to assist in an Azure deployment.
The Cloud Adoption Framework Lifecycle
- Define Strategy
- Plan
- Ready
- Adopt
- Secure
- Manage
- Govern
Principles of Microsoft’s approach to Privacy
Security
Strong legal protections for privacy
No content-based targeting
Benefits to customers data we collect
Customer control
Transparency
Zero Trust model
Assumes breach, and that all networks are open and untrusted
Three guiding principles:
verify explicitly
least privilege access
assume breach
What should you use for storing passwords in a protected format?
Hashing
Symmetric encryption
uses the same key to encrypt and decyrpt data
Asymmetric encryption
uses a public key and private key pair
Hashing
uses an algorithm to convert text to a unqiue fixed-length valuse
Authentication
responsible for identifying who a user is
Authorization
responsible for determing which level of access authenticated users have