Best Pratices
High Level Documentation¶
Link | Notes |
---|---|
Map the Cloud |
|
Security documentation | Central Docs site from Microsoft |
Microsoft Azure Well-Architected Framework |
|
Azure Security Center Learning Path | |
Azure Sentinel Learning Path | Learning path describing basic architecture, core capabilities, and primary use cases of Azure Sentinel |
IAM¶
Link | Notes |
---|---|
Permissions Reference for Azure IAM | A website built in order to provide an alternate, community-driven source of truth for Azure identity |
Operational Guides¶
Link | Notes |
---|---|
Azure security best practices and patterns | Security best practices to use when designing, deploying, and managing cloud solutions by using Azure |
Azure operational security checklist | Checklist to assist in evaluating applications against a list of essential and recommended operational security actions |
aks-checklist |
|
Office 365¶
Link | Notes |
---|---|
Purchased Microsoft 365 E5, Now What? | Microsoft 365 E5 suite is a large amount of products Microsoft offers for the Enterprise environment, more focused towards the security and compliance areas |
How to Protect Office 365 with Azure Sentinel | Approaches to onboard Office 365 and related services into Azure Sentinel |
Protecting Microsoft 365 from on-premises attacks | How to configure your systems to protect your Microsoft 365 cloud environment from on-premises compromise |