Chapter 2: Describing Security Methodologies
The previous chapter covered the necessary preparation for the SC-900 Security, Compliance, and Identity Fundamentals exam. This chapter will discuss the key methodologies for security, shared responsibility, and identity protection. Once you have completed this chapter, you will have a solid understanding of the foundational methods and principles that Microsoft 365 and Azure solutions follow for security, compliance, and identity protection.
In this chapter, we're going to cover the following main topics:
- Describing and using a defense-in-depth security strategy
- Understanding shared responsibility within cloud security
- Using and implementing the principles of the zero-trust methodology
Describing ...
Get Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.