Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Microsoft Cybersecurity Architect Exam Ref SC-100
Microsoft Cybersecurity Architect Exam Ref SC-100

Microsoft Cybersecurity Architect Exam Ref SC-100: Ace the SC-100 exam and develop cutting-edge cybersecurity strategies , Second Edition

Arrow left icon
Profile Icon Dwayne Natwick Profile Icon Graham Gold Profile Icon Abu Zobayer
Arrow right icon
$27.98 $39.99
eBook Oct 2024 300 pages 2nd Edition
eBook
$27.98 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m
Arrow left icon
Profile Icon Dwayne Natwick Profile Icon Graham Gold Profile Icon Abu Zobayer
Arrow right icon
$27.98 $39.99
eBook Oct 2024 300 pages 2nd Edition
eBook
$27.98 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m
eBook
$27.98 $39.99
Paperback
$49.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Table of content icon View table of contents Preview book icon Preview Book

Microsoft Cybersecurity Architect Exam Ref SC-100

Build an Overall Security Strategy and Architecture

This chapter will discuss the ways that a cybersecurity architect delivers the development and design of a security strategy. Cybersecurity architects must also be able to communicate that strategy to business leaders and provide direction on how it integrates cloud, hybrid, and multi-tenant environments. Once you have completed this chapter, you will have the tools and knowledge to identify, design, and communicate these requirements to the company.

This chapter extends on the Design solutions that align with security best practices and priorities domain, which constitutes 20–25% of the SC-100 Exam Guide. You’ll learn how to develop a resiliency strategy for ransomware and other attacks based on Microsoft security best practices. Additionally, this chapter covers designing solutions that adhere to the Microsoft Cybersecurity Reference Architectures (MCRA) and the Microsoft Cloud Security Benchmark (MCSB). Furthermore...

Identifying the Integration Points in an Architecture by Using the Microsoft Cybersecurity Reference Architectures

Cybersecurity architects must have a solid foundation in the design and integration of security across multiple environments. As is the case with any design, planning is necessary at the beginning before any formal architecture can be created and performed. The cybersecurity architect must understand the current environment and how the various components of that environment interact and integrate. This includes the controls that are currently in place and how they are used.

Cybersecurity architects will be involved in designing security architectures based on best practices and security frameworks, as well as existing company environments. You may be asked to retrofit security controls from an on-premises environment to cloud environments that are part of a company’s journey to the cloud. This requires a broad understanding of not just Microsoft technology but...

Translating Business Goals into Security Requirements

Cybersecurity, as is the case with most information technology (IT), is thought of by businesses as unavoidable and something that must be implemented. Therefore, a cybersecurity architect needs to be able to align the controls to protect the company with the business goals of the company.

Cyber-attacks affect companies in diverse ways. They can damage the reputation of the victim company in the case of a high-profile attack, cause economic damage if important business documents or financial data are breached, and lead to regulatory costs from potential fines if the breach is caused by inadequately addressing compliance standards.

Each of these business impacts needs to be addressed and presented to the company when building a cybersecurity architecture. A proper risk analysis should be done for threats to identify proper security controls and present them to the company to help them understand the security and business impact...

Translating Security Requirements into Technical Capabilities

Now that you understand the security posture, defense-in-depth, and shared responsibility as you begin to architect cybersecurity for the cloud, it is time to discuss the makeup of a security operations team and the levels of a cybersecurity attack.

In Chapter 1, Cybersecurity in the Cloud, the concept of building a defense-in-depth security strategy was discussed. In this section, you will take each of those defense-in-depth requirements and align them with some security products, services, and processes. Figure 2.3 shows the defense-in-depth strategy:

Figure 2.3 – Defense-in-depth security diagram

Figure 2.3: Defense-in-depth security diagram

Each of these layers can be protected with controls that a cybersecurity architect should address in the design.

Physical

The physical level of defense includes the actual hardware technology and spans the entire data center facility. In a cloud infrastructure, the cloud provider, such as...

Designing Security for a Resiliency Strategy

Not everything about cybersecurity involves protecting against threats and vulnerabilities. A key part of a cybersecurity architecture is having resiliency within the design. A resilient architecture will protect a company against disruption or data loss from an attack. Building a resilient architecture is within the network, compute, and storage design. Creating a resilient strategy for your architecture provides a level of business continuity to your company. This can allow continued operations in the case of a disastrous event.

Note

NIST 800-160 provides some guidance on resiliency and business continuity here: https://csrc.nist.gov/pubs/sp/800/160/v2/r1/final.

Resilient networks are built within virtual networking and security designed to provide both segmentation and redundancy throughout the architecture. Maintaining segmentation between private and public resources while also creating geographic separation and redundancy...

Integrating a Hybrid or Multi-Tenant Environment into a Security Strategy

This chapter has discussed several strategies and ways to implement zero trust, defense-in-depth, and resiliency in the architecture. At the time of writing, most companies have more than just Microsoft services and solutions within their infrastructure. Therefore, a cybersecurity architect needs to account for those additional environments in their design for the company. This includes private or on-premises data centers, other cloud providers (AWS or GCP), and multi-tenant Microsoft environments. Let us look at each of these and how to integrate them into the security strategy:

  • Private data centers: Most companies today have a combination of private and public infrastructures also known as hybrid infrastructures. These architectures create complexity in network communications, identity and access management, and applications. The challenge is that these legacy private data centers have existing security...

Developing a Technical and Governance Strategy for Traffic Filtering and Segmentation

The last section of this chapter addresses how you would develop a strategy for traffic filtering and segmentation. In the Translating Security Requirements into Technical Capabilities section, you learned about protecting the network perimeter through network segmentation by utilizing different virtual networks and filtering traffic with Azure Firewall or a WAF.

As a cybersecurity architect, you need to recognize the areas that require this filtering and network segmentation. As has been stated previously, taking a proper inventory of controls that are currently in place; understanding the business requirements; knowing local regulations, standards, and jurisdictions; and determining the industry requirements for your company all play a crucial role in determining how to design the technical and governance requirements of your security architecture.

Traffic filtering can be addressed in multiple...

Summary

In this chapter, you learned about the areas of design and architecture, which are part of the overall security strategy. This included the MCRA for building that foundational architectural strategy. You also learned about the need to understand business goals to align them with your security strategy. You explored the solutions and services that can be used for a defense-in-depth security strategy. You also discovered the steps of building a resilient security architecture. This included the integration of hybrid, multi-cloud, and multi-tenant infrastructures, and technical governance for traffic filtering and network segmentation. These strategies are the foundation of the concepts of cybersecurity architecture and the zero-trust methodology.

The next chapter will discuss the strategies for designing the architecture for security operations.

Exam Readiness Drill – Chapter Review Section

Apart from mastering key concepts, strong test-taking skills under time pressure are essential for acing your certification exam. That’s why developing these abilities early in your learning journey is critical.

Exam readiness drills, using the free online practice resources provided with this book, help you progressively improve your time management and test-taking skills while reinforcing the key concepts you’ve learned.

How to Get Started

  1. Open the link or scan the QR code at the bottom of this page.
  2. If you have unlocked the practice resources already, log in to your registered account. If you haven’t, follow the instructions in Chapter 11 and come back to this page.
  3. Once you have logged in, click the START button to start a quiz.

We recommend attempting a quiz multiple times till you’re able to answer most of the questions correctly and well within the...

Left arrow icon Right arrow icon
Download code icon Download Code

Key benefits

  • Gain a deep understanding of all topics covered in the latest SC-100 exam
  • Advance your knowledge of architecting and evaluating cybersecurity services to tackle day-to-day challenges
  • Get certified with ease through mock tests with exam-level difficulty
  • Benefit from practical examples that will help you put your new knowledge to work

Description

This Second Edition of Microsoft Cybersecurity Architect Exam Ref SC-100 is a comprehensive guide that will help cybersecurity professionals design and evaluate the cybersecurity architecture of Microsoft cloud services. Packed with practice questions, mock exams, interactive flashcards, and invaluable exam tips, this comprehensive resource gives you everything you need to conquer the SC-100 exam with confidence. This book will take you through designing a strategy for a cybersecurity architecture and evaluating the governance, risk, and compliance (GRC) of the architecture of both cloud-only and hybrid infrastructures. You'll discover how to implement zero trust principles, enhance security operations, and elevate your organization's security posture. By the end of this book, you'll be fully equipped to plan, design, and assess cybersecurity frameworks for Microsoft cloud environments—and pass the SC-100 exam with flying colors. Ready to take your cybersecurity expertise to the next level? This guide is your key to success.

Who is this book for?

This book targets is for IT professionals pursuing the Microsoft Cybersecurity Architect Expert SC-100 certification. Familiarity with the principles of administering core features and services within Microsoft Azure, Microsoft 365 and on-premises related technologies (server, active directory, networks) are needed. Prior knowledge of integration of these technologies with each other will also be beneficial.

What you will learn

  • Design a zero-trust strategy and architecture
  • Evaluate GRC technical and security operation strategies
  • Apply encryption standards for data protection
  • Utilize Microsoft Defender tools to assess and enhance security posture
  • Translate business goals into actionable security requirements
  • Assess and mitigate security risks using industry benchmarks and threat intelligence
  • Optimize security operations using SIEM and SOAR technologies
  • Securely manage secrets, keys, and certificates in cloud environments

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 31, 2024
Length: 300 pages
Edition : 2nd
Language : English
ISBN-13 : 9781836208501
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
OR
Modal Close icon
Payment Processing...
tick Completed

Billing Address

Product Details

Publication date : Oct 31, 2024
Length: 300 pages
Edition : 2nd
Language : English
ISBN-13 : 9781836208501
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
Banner background image

Table of Contents

12 Chapters
Chapter 1: Cybersecurity in the Cloud Chevron down icon Chevron up icon
Chapter 2: Build an Overall Security Strategy and Architecture Chevron down icon Chevron up icon
Chapter 3: Design a Security Operations Strategy Chevron down icon Chevron up icon
Chapter 4: Design an Identity Security Strategy Chevron down icon Chevron up icon
Chapter 5: Design a Regulatory Compliance Strategy Chevron down icon Chevron up icon
Chapter 6: Evaluate Security Posture and Recommend Technical Strategies to Manage Risk Chevron down icon Chevron up icon
Chapter 7: Design a Strategy for Securing Server and Client Endpoints Chevron down icon Chevron up icon
Chapter 8: Design a Strategy for Securing SaaS, PaaS, and IaaS Chevron down icon Chevron up icon
Chapter 9: Specify Security Requirements for Applications Chevron down icon Chevron up icon
Chapter 10: Design a Strategy for Securing Data Chevron down icon Chevron up icon
Chapter 11: Accessing the Online Practice Resources Chevron down icon Chevron up icon
Other Books You May Enjoy Chevron down icon Chevron up icon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.