Chapter 2: Describing Security Methodologies
The previous chapter covered the necessary preparation for the SC-900 Security, Compliance, and Identity Fundamentals exam. This chapter will discuss the key methodologies for security, shared responsibility, and identity protection. Once you have completed this chapter, you will have a solid understanding of the foundational methods and principles that Microsoft 365 and Azure solutions follow for security, compliance, and identity protection.
In this chapter, we're going to cover the following main topics:
- Describing and using a defense-in-depth security strategy
- Understanding shared responsibility within cloud security
- Using and implementing the principles of the zero-trust methodology