Summary
In this chapter, we covered various security concepts and methodologies. These include the defense-in-depth security posture to counteract and protect against a cyber-attack, the evolution to the cloud and the shared responsibility to protect our infrastructure between the company and the cloud provider, and the zero-trust model to protect our access to data and applications now that identity has become our first level of defense within cloud technologies.
These will be the foundation of the security, compliance, and identity solutions provided by Microsoft that will be discussed throughout this book.
In the next chapter, we will discuss the various threats to our cloud and hybrid infrastructure and the role and ways in which encryption can be utilized.