Skip to main content

Command Palette

Search for a command to run...

Note # 1: Zero Trust Strategy

Cybersecurity Hierarchy

Updated
2 min read
Note # 1: Zero Trust Strategy
S

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

A

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.

Cybersecurity Architect Roles and Tools:

Cybersecurity Hierarchy

  1. Business Leadership:

    • CEO: Focuses on business goals and digital transformation.
  2. Technical Leadership:

    • CIO (Chief Information Officer) and CISO (Chief Information Security Officer): Develop security strategy and integrate business with security.

      • They analyze strategies but do not implement them.
  3. Architects and Technical Managers*: Responsible for designing architecture, creating policies, and planning (implementation is not included yet).

    See the details below in the next paragraph.

  4. Security Engineers and Operations:

    Handle implementation, monitoring, response, and investigations.

*Cybersecurity Architect:

A Cybersecurity Architect focuses on prevention by managing GRC (Governance, Risk, and Compliance) and understanding and improving the security posture. In terms of protection, they ensure security for identity, devices, data, and applications. When it comes to investigating and responding to incidents, they are involved in security operations, managing the SOC (Security Operations Center), and handling incidents, So:

Prevent:

  • GRC (Governance, Risk, and Compliance)

  • Security Posture: Understand and improve the security posture.

Protect:

  • Ensure security for identity, devices, data, and applications.

Investigate/Respond to Incidents:

  • Security Operations

  • Manage SOC (Security Operations Center).

  • Handle incidents.

Tools for Cybersecurity Architects: Tools we can use to define framework, architecture, etc.

  1. CAF (Cloud Adoption Framework): Start with CAF. It provides different steps to help us deploy infrastructure or migrate to the cloud. It helps identify strategies, objectives, and motivations. In these steps, we need to study security, manage resources, and governance.

  1. MCRA (Microsoft Cybersecurity Reference Architecture): This shows how to integrate solutions. We can use it as a reference when building architecture if we don't know where to start. Download the December 2023 version of the MCRA.

3. WAF (Well-Architected Framework): Guidance on:

  • Reliability

  • Cost optimization

  • Operational excellence

  • Performance efficiency

  • Security

  1. Zero Trust Model (Global Framework): These tools help us define all our security strategies. This involves not only cybersecurity architecture but also technical leadership, as it includes all security strategies. All designs must follow the principles of zero trust.

30 views

SC-100

Part 2 of 5

The SC-100 certification, officially called Microsoft Certified: Cybersecurity Architect Expert, is designed for professionals who specialize in cybersecurity strategies and architecture.

Up next

Note #2: Why? What is Zero Trust model?

Trust no one, verify everyone! Different definitions exist..

More from this blog

A

An Azure Cloud Lab Journey...

45 posts