-
Book Overview & Buying
-
Table Of Contents
-
Feedback & Rating

Microsoft Cybersecurity Architect Exam Ref SC-100
By :

As you build a strategy to secure users, devices, infrastructure, applications, and data, you need to consider the monitoring, management, and operations that will govern the strategy. Documented and maintained security operations frameworks, processes, and procedures are identified and created for this governance.
A popular framework that was originally developed in the United States has been adopted globally by companies as a strong cybersecurity framework. This is known as the National Institute of Standards and Technology (NIST) framework. Information on the NIST framework can be found at this link: https://www.nist.gov/cybersecurity.
NIST’s Cybersecurity Framework (CSF) has documented practices for proper processes and procedures for security operations within your company. These include that proper security operations should be able to detect potential threats and adversaries within the environment...
Change the font size
Change margin width
Change background colour