Summary
In this chapter, we provided an overview of some of the mechanisms that should be part of the security foundation, such as strong authentication mechanisms, identity life cycle management, and vulnerability management. Then, we looked at the different zero-trust pillars, such as identity, device, and network. Lastly, we looked at how security monitoring can help us detect attacks or signs of compromise.
Having this as part of our security foundation can greatly reduce the risk of any type of attack that is utilizing weak security credentials or vulnerabilities.
In the next chapter, we will take a closer look at how to set up security monitoring using Microsoft Sentinel and Microsoft Defender for Cloud to provide better insight into our environment.