Part 2: Designing a Zero-Trust Strategy and Architecture
This section will focus on the designing and planning of a zero-trust strategy and architecture. This includes the Microsoft Cybersecurity Reference Architectures (MCRA) and strategies for creating a security infrastructure, identities, and operations.
This part has the following chapters:
- Chapter 2, Building an Overall Security Strategy and Architecture
- Chapter 3, Designing a Security Operations Strategy
- Chapter 4, Designing an Identity Security Strategy