Note # 1: Zero Trust Strategy
Cybersecurity Hierarchy

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.
I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.
Cybersecurity Architect Roles and Tools:

Cybersecurity Hierarchy
Business Leadership:
- CEO: Focuses on business goals and digital transformation.
Technical Leadership:
CIO (Chief Information Officer) and CISO (Chief Information Security Officer): Develop security strategy and integrate business with security.
- They analyze strategies but do not implement them.
Architects and Technical Managers*: Responsible for designing architecture, creating policies, and planning (implementation is not included yet).
See the details below in the next paragraph.
Security Engineers and Operations:
Handle implementation, monitoring, response, and investigations.

*Cybersecurity Architect:
A Cybersecurity Architect focuses on prevention by managing GRC (Governance, Risk, and Compliance) and understanding and improving the security posture. In terms of protection, they ensure security for identity, devices, data, and applications. When it comes to investigating and responding to incidents, they are involved in security operations, managing the SOC (Security Operations Center), and handling incidents, So:
Prevent:
GRC (Governance, Risk, and Compliance)
Security Posture: Understand and improve the security posture.
Protect:
- Ensure security for identity, devices, data, and applications.
Investigate/Respond to Incidents:
Security Operations
Manage SOC (Security Operations Center).
Handle incidents.
Tools for Cybersecurity Architects: Tools we can use to define framework, architecture, etc.
- CAF (Cloud Adoption Framework): Start with CAF. It provides different steps to help us deploy infrastructure or migrate to the cloud. It helps identify strategies, objectives, and motivations. In these steps, we need to study security, manage resources, and governance.

- MCRA (Microsoft Cybersecurity Reference Architecture): This shows how to integrate solutions. We can use it as a reference when building architecture if we don't know where to start. Download the December 2023 version of the MCRA.

3. WAF (Well-Architected Framework): Guidance on:
Reliability
Cost optimization
Operational excellence
Performance efficiency
Security

- Zero Trust Model (Global Framework): These tools help us define all our security strategies. This involves not only cybersecurity architecture but also technical leadership, as it includes all security strategies. All designs must follow the principles of zero trust.
