1. Home
  2. Training Library
  3. Microsoft Azure
  4. Courses
  5. Introduction to Cloud Security Posture Management

Summary

Contents

keyboard_tab
Course Introduction
1
Introduction
PREVIEW1m 28s
2
Overview
PREVIEW3m 51s
Cloud Security Posture Management
Course Summary
4
Summary
1m 41s
Start course
Overview
Difficulty
Beginner
Duration
13m
Students
65
Ratings
5/5
starstarstarstarstar
Description

Cloud Security Posture Management describes how well a cloud environment is secured from events, particularly malicious threats, that could compromise the integrity of its data and infrastructure. As cloud environments are virtual and depend on many settings, an enormous opportunity exists for incorrectly configured infrastructure to be exploited. This course introduces the student to Cloud Security Posture Management and how associated tools can assess and aid in securing a cloud environment against external attacks.

Learning Objectives

  • Explanation of Cloud Security Posture Management
  • Why Cloud Security Posture Management is important
  • How Microsoft Defender for Cloud implements Cloud Security Posture Management

Intended Audience

  • Students who want to know about Cloud Security Posture Management and how it relates to Microsoft Defender for Cloud
  • Students who intend to take the SC-900 exam: Microsoft Security, Compliance, and Identity Fundamentals

Prerequisites 

An understanding of general technical concepts.

Transcript

The concept of Cloud Security Posture Management was born out of the need to address the security and configuration differences between on-premises and cloud-based workloads. Migrating workloads from on-premises to the cloud significantly increases their attack surfaces and the types of attacks that can be launched against them. An infrastructure as a service environment with its innate higher levels of configuration acts as a multiplier to the already increased threat potential. 

A good CSPM tool will assess all workloads and resources within an environment for their potential to fall victim to all known attack vectors. In addition to an initial assessment, a CSPM tool should monitor the configuration of assets to ensure they are in a secure and protected state. When vulnerabilities are identified, the CSPM tool should make it quick and easy to rectify issues. Microsoft Defender for Cloud implements Cloud Security Posture Management through its security posture metric, a percentage score describing an Azure environment's overall security. Security posture allows you to drill down into security controls identifying resources at risk along with recommended fixes.

My name is Hallam Webber, and I hope you've found this Introduction to Cloud Security Posture Management course informative and interesting. Until next time, be safe and secure.

About the Author
Students
24036
Courses
56
Learning Paths
10

Hallam is a software architect with over 20 years experience across a wide range of industries. He began his software career as a  Delphi/Interbase disciple but changed his allegiance to Microsoft with its deep and broad ecosystem. While Hallam has designed and crafted custom software utilizing web, mobile and desktop technologies, good quality reliable data is the key to a successful solution. The challenge of quickly turning data into useful information for digestion by humans and machines has led Hallam to specialize in database design and process automation. Showing customers how leverage new technology to change and improve their business processes is one of the key drivers keeping Hallam coming back to the keyboard.