Summary
In this chapter, we discussed designing a strategy for securing data and mitigating threats, including mitigating threats to data, identifying and protecting sensitive data, and data encryption standards. This included the use of information protection for labeling sensitive data. Microsoft Purview can be used to govern data with labels that can be used across Microsoft 365, Azure, and multi-cloud resources.
The next chapter will provide mock exam questions to help prepare you for the SC-100 Microsoft Cybersecurity Architect exam. This chapter will also include responses to address the requirements within the case studies provided throughout this book.