Recommending security capabilities or controls to mitigate identified risks
Once you have evaluated and identified risks, you determine how to mitigate them. The life cycle of risk analysis is a continuous cycle of identification, assessment, response, monitoring, and reporting. Figure 6.26 shows this life cycle and the continuous cycle of identifying and mitigating risks:
Figure 6.26 – Risk assessment and mitigation life cycle
Throughout this chapter, you have learned about tools within Microsoft Defender for Cloud that help you identify potential risks and vulnerabilities that could create threats and attacks on your company’s environment. Whether you are using regulatory compliance, security posture, and the Secure score or workload protection, you are reviewing and analyzing risks and gathering recommendations for controls that you can put in place to mitigate these risks. As a cybersecurity architect, you should utilize these tools...