Post Content
In this continuing conversation about the complexities of designing an enterprise-level security architecture for multi-environment applications, Uli, Eric, and David—AKA the Armchair Architects— will discuss the importance of understanding both the effectiveness of security setups and the evolving threat landscape.
In this episode, you’ll gain insights into how architects can ensure robust security across various environments, manage threat detection drift, and implement zero trust architectures, particularly for sensitive data like personally identifiable information (PII).
Be sure to watch part one of “Armchair Architects: Enterprise Security and Governance” (https://aka.ms/AzEssentials/179), before watching this video.
Resources
• Azure security https://learn.microsoft.com/azure/security
• Azure threat protection https://learn.microsoft.com/azure/security/fundamentals/threat-detection
• Recommendations for threat analysis https://learn.microsoft.com/azure/well-architected/security/threat-model
• Training: Concepts of cybersecurity https://learn.microsoft.com/training/paths/describe-basic-concepts-of-cybersecurity
• Cloud security posture management (CSPM) https://learn.microsoft.com/azure/defender-for-cloud/concept-cloud-security-posture-management
• Azure encryption https://learn.microsoft.com/azure/security/fundamentals/encryption-overview
Related Episodes
• Armchair Architects: Enterprise Security and Governance (pt 1) https://aka.ms/AzEssentials/179
• Watch all the Armchair Architects episodes https://aka.ms/ArmchairArchitects
• Watch the Azure Essentials Show https://aka.ms/AzureEssentialsShow
Connect
• Ulrich (Uli) Homann https://www.linkedin.com/in/ulrichhomann
• Eric Charran https://www.linkedin.com/in/ericcharran
• David Blank-Edelman https://www.linkedin.com/in/dnblankedelman
Chapters
0:00 Introduction
0:39 Two dimensions of monitoring
1:33 Architects need to understand the landscape
1:40 Supply chains shouldn’t be trusted
2:15 Develop internal processes to mitigate risk
3:12 Cloud security posture management fabric (CPSM)
4:40 What makes security architects sleep well
5:21 Understand your environment
5:53 Not all assets are equal
7:19 Shift left security
7:32 SDLC Read More Microsoft Developer