As part of Zero Trust adoption guidance, this article is part of the Prevent or reduce business damage from a breach business scenario and describes how to protect your organization from cyberattacks. This article focuses on how to deploy additional security measures to prevent a breach and limit its spread and to create and test a business continuity and disaster recovery (BCDR) infrastructure to more quickly recover from a destructive breach. By BrendaCarter, joe-davies-affirm and MicrosoftGuyJFlo.
The article main focus is around guiding principles such as Minimize blast radius and segment access and Verify end-to-end encryption.
The content captures:
- The adoption cycle for implementing security breach prevention and recovery infrastructure
- Define strategy phase
- Motivations for implementing security breach prevention and recovery infrastructure
- Outcomes for implementing security breach prevention and recovery infrastructure
- Plan phase
- Ready phase
- Adopt phase
- Govern and manage phases
… and more. Governance of your organization’s ability to implement breach prevention and recovery is an iterative process. By thoughtfully creating your implementation plan and rolling it out across your digital estate you have created a foundation. Use the following tasks to help you start building your initial governance plan for this foundation. Excellent guide!
[Read More]