| Enforce AKS image signature validation with Ratify and Azure Policy |
https://learn.microsoft.com/en-us/azure/security/container-secure-supply-chain/articles/validating-image-signatures-using-ratify-aks |
| Implement auditing and logging mitigations with Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-auditing-and-logging |
| Implement authentication mitigations with Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authentication |
| Mitigate authorization threats in Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-authorization |
| Secure communications based on Threat Modeling Tool findings |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-communication-security |
| Harden configuration management using Threat Modeling Tool mitigations |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-configuration-management |
| Implement cryptography mitigations from Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-cryptography |
| Secure exception management using Threat Modeling Tool guidance |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-exception-management |
| Apply secure input validation mitigations from Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-input-validation |
| Protect sensitive data using Threat Modeling Tool mitigations |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-sensitive-data |
| Implement secure session management from Threat Modeling Tool |
https://learn.microsoft.com/en-us/azure/security/develop/threat-modeling-tool-session-management |
| Apply Azure-specific security best practices for AI workloads |
https://learn.microsoft.com/en-us/azure/security/fundamentals/ai-security-best-practices |
| Configure Microsoft Antimalware in Azure with PowerShell |
https://learn.microsoft.com/en-us/azure/security/fundamentals/antimalware-code-samples |
| Use Azure Certificate Authority roots and requirements |
https://learn.microsoft.com/en-us/azure/security/fundamentals/azure-certificate-authority-details |
| Design Azure backup and restore plan against ransomware |
https://learn.microsoft.com/en-us/azure/security/fundamentals/backup-plan-to-protect-against-ransomware |
| Implement Azure resource security best practices |
https://learn.microsoft.com/en-us/azure/security/fundamentals/best-practices-and-patterns |
| Configure alternate email notifications for Customer Lockbox |
https://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-alternative-email |
| Control Microsoft engineer data access with Customer Lockbox |
https://learn.microsoft.com/en-us/azure/security/fundamentals/customer-lockbox-overview |
| Implement Azure-specific incident response practices |
https://learn.microsoft.com/en-us/azure/security/fundamentals/incident-response-overview |
| Review Azure SQL Database built-in security features |
https://learn.microsoft.com/en-us/azure/security/fundamentals/infrastructure-sql |
| Apply Azure operational security checklist actions |
https://learn.microsoft.com/en-us/azure/security/fundamentals/operational-checklist |
| Understand security access methods for Azure production network |
https://learn.microsoft.com/en-us/azure/security/fundamentals/production-network |
| Understand Azure controls for protection of customer data |
https://learn.microsoft.com/en-us/azure/security/fundamentals/protection-customer-data |
| Detect and respond to ransomware using Azure security tools |
https://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-detect-respond |
| Use Azure-native features to protect against ransomware |
https://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-features-resources |
| Prepare Azure environments to withstand ransomware attacks |
https://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-prepare |
| Configure Azure Firewall Premium to mitigate ransomware |
https://learn.microsoft.com/en-us/azure/security/fundamentals/ransomware-protection-with-azure-firewall |