CYBER SECURITY LESSON ONE

 

INTRODUCTION TO BEST PRACTICES

 

LESSON DETAILS

This module covers the topic of Zero Trust and Best practice frameworks for Microsoft Cyber security capabilities.

 Imagine you're a cybersecurity architect in a large organization. You have been tasked with modernizing the organization's cybersecurity. You know that best practices are essential to achieve this goal, but you aren't sure which framework to use. You have heard about Zero Trust and its potential benefits, but you aren't sure how to get started. This module helps you understand best practices and how to use them as a cybersecurity architect. You'll also learn about the concept of Zero Trust and how to get started with it in an organization.

 

The module is divided into five units: Introduction to Best Practices, Introduction to Zero Trust, Zero Trust Initiatives, Zero Trust Technology Pillars Part 1, and Zero Trust Technology Pillars Part 2.

 

By the end of this module, you'll be able to understand how to use best practices as a cybersecurity architect, understand the concept of Zero Trust and how it can be used to modernize an organization's cybersecurity, and understand when to use different best practice frameworks like MCRA, CAF, and WAF.

LEARNING OBJECTIVES

1.      Upon completion of this module, the learner is able to:

2.      Understand how to use best practices as a cybersecurity architect.

3. Understand the concept of Zero Trust and how it can be used to modernize an organizations       cybersecurity.

 4.      Understand when to use different best practice frameworks like MCRA, CAF and WAF.      The content in the module helps you prepare for the certification exam SC-100: Microsoft Cybersecurity Architect.

 

PREREQUISITES

Conceptual knowledge of security policies, requirements, zero trust architecture, and management of hybrid environments, Working experience with zero trust strategies, applying security policies, and developing security requirements based on business goals.

BEST PRACTICES

Best practices are recommended ways to do things that have been found to be most effective or efficient.

Best practices help you avoid mistakes and ensure that your resources and effort aren't wasted.

Best practices come in many forms:

Exact instructions on what to do, why to do it, who should do it, and how to do it high level principles to help with different types of decisions and actions guidelines that are part of a reference architecture that describes components that should be included in a solution and how to integrate them together

Microsoft has embedded security best practices in various forms of guidance including:

Microsoft Cybersecurity Reference Architectures

Microsoft cloud security benchmark

The Cloud Adoption Framework (CAF)

The Azure Well-Architected Framework (WAF)

Microsoft security best practices

 Antipatterns

An antipattern is a common mistake that lead to negative outcomes. It's the opposite of a best practice. Many best practices are designed to help you avoid antipatterns.

An example of a best practice that helps you overcome numerous antipatterns is applying security patches regularly. Microsoft has observed multiple antipatterns that get in the way of regularly applying this basic and critically important security best practice:

We don't patch (unless it's critical) - This antipattern avoids patch installation because of an implicit assumption that patches aren't important. Another version of this is that 'It won't happen to us', a belief that unpatched vulnerabilities won't be exploited because it hasn't happened before (or hasn't been detected).

Waiting for patch perfection instead of building resilience - This antipattern avoids patching because of a fear that something could go wrong with the patches. This antipattern also increases likelihood of downtime from attackers.

Broken accountability model - This antipattern holds security accountable for the negative outcomes of patches. This accountability model leads to other teams de-prioritize security maintenance

Over-customizing patch selection - This antipattern uses unique criteria for patching instead of applying all manufacturer recommended patches. This customization effectively creates custom builds of Windows, Linux, and applications which have never been tested in that exact configuration.

Focusing only on operating systems - This antipattern patches only servers and workstations without also addressing containers, applications, firmware, and IoT/OT devices

HOW ARCHITECTS USE BEST PRACTICES

Security best practices must be integrated into people's skills and habits, organizational processes, and technology architecture and implementation.

Cybersecurity architects help integrate security best practices and make them actionable by doing the following:

Integrating best practices into security architecture and policy

Advising security leaders on how to integrate best practices into business processes, technical processes, and culture.

Advising technical teams on implementing best practices, and which technology capabilities make best practices easier to implement.

Advising others in the organization such as Enterprise Architects, IT Architects, application owners, developers, and more on how to integrate security best practices in their areas of ownership.

Follow best practices unless you have a reason to avoid them. Organizations should follow well-defined and well-reasoned best practices unless there is a specific reason to avoid them. While some organizations can ignore certain best practices for good reasons, organizations should be cautious before ignoring high quality best practices like those provided by Microsoft. Best practices aren't perfectly applicable to all situations, but they've been proven to work elsewhere so you shouldn't ignore or alter them without good reason.

Adapt but don't over-customize - Best practices are general guidance that work across most organizations. You may need to adapt best practices to the unique circumstances of your organization. You should be careful not to customize them to the point where the original value is lost. An example of this is adopting passwordless and multi-factor authentication, but making exceptions for the highest impact business and IT accounts that attackers value most.

Adopting best practices will reduce common mistakes and improve overall security effectiveness and efficiency.


 

Post a Comment

Previous Post Next Post

Contact Form