The US Executive Order on Improving the Nation's Cybersecurity requires US Federal Government organizations modernize cybersecurity and adopt a Zero Trust architecture. This is especially urgent for the 16 critical infrastructure sectors identified by the US Cybersecurity and Infrastructure Security Agency (CISA). Organizations in the critical...
Today we’re announcing that our Security Technical Implementation Guide (STIG) solution templates are now also available in Azure Government Secret, enabling customers to build, host, and transform their applications faster across Impact Level 6 on secure and compliant infrastructure.
Form Recognizer can analyze and extract information from government-issued identification documents (IDs) using its prebuilt IDs model to help reduce the time, complexities and errors that come with manually extracting data from various ID types and formats.
The Department of Defense (DoD) has approved Microsoft access to the Enterprise Mission Assurance Support Service (eMASS). This allows DoD mission owners to coordinate with Microsoft on access to the Azure security authorization packages, including control inheritance and control implementation details.
In this video, Lili Davoudian and TJ Banasik, CISSP-ISSEP, ISSAP, ISSMP, discuss and demonstrate how when coupled, Azure Security Center and Azure Sentinel create an integrated end-to-end detection, investigation, and response platform for protecting cloud workloads.
We invite you to RSVP and join the Azure Government User Community Wednesday, May 26 from 6 p.m. to 7 p.m. EST for a meetup on “What’s next? Emerging tech impacting US government” via Teams Live.
SQL Server container images can now be used in highly-controlled environments, such as federal government, DoD, and Defense Industrial Base organizations, where the prerequisite to leverage any container image is that it must be hardened and accredited. To get started, you can download the container image from Iron Bank.
The Azure team just released a new CMMC Level 3 initiative for Azure Policy and a corresponding blueprint sample. These preview releases are available in Azure and Azure Government. In this blog post we break down the releases and how customers can use these tools to accelerate CMMC compliance in Azure.
The Azure Sentinel: Zero Trust (TIC 3.0) Workbook provides an overlay of Microsoft offerings to Zero Trust models, measurable over time via visualizations. Implementers, SecOps analysts, assessors, security and compliance decision makers, and MSSPs can leverage this capability to build, design, and monitor cloud security architectures.
Brendan Burns, Microsoft CVP of Azure Compute and Co-Founder of Kubernetes, presents at the United States Air Force Software Officer, Nicolas Chaillan’s, Ask Me Anything (AMA) series on DevSecOps for DoD.