Chapter 3Define an Identity Security Strategy
THE MICROSOFT SC-100 EXAM OBJECTIVES COVERED IN THIS CHAPTER INCLUDE:
- Design a strategy for access to cloud resources
- Recommend an identity store (tenants, B2B, B2C, hybrid)
- Recommend an authentication strategy and authorization strategy
- Design a strategy for conditional access
- Design a strategy for role assignment and delegation
- Design security strategy for privileged role access to infrastructure including identity-based firewall rules and Azure PIM
- Design security strategy for privileged activities including PAM, entitlement management, and cloud tenant administration
In this chapter, we will focus on designing an identity security strategy. To design an identity security strategy, you ...
Get MCE Microsoft Certified Expert Cybersecurity Architect Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.