Showing tag results for Executive Order

Aug 21, 2017
Post comments count0
Post likes count0

Microsoft Azure Enables NIST CSF Compliance: Recover Function

Matt Rathbun
Matt Rathbun

Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the final release in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This release specifically outlines how to implement the Recover function requirements using the service...

Azure GovernmentComplianceSecurity
Jul 24, 2017
Post comments count0
Post likes count0

Microsoft Azure Enables NIST CSF Compliance: Detect Function

Matt Rathbun
Matt Rathbun

Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the third release in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This release specifically outlines how to implement the Detect function requirements using the services o...

Azure GovernmentComplianceSecurity
Jul 13, 2017
Post comments count0
Post likes count0

Microsoft Azure Enables NIST CSF Compliance: Protect Function

Matt Rathbun
Matt Rathbun

Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the second release in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This release specifically outlines how to implement the Protect function requirements using the servic...

Azure GovernmentComplianceSecurity
Jun 27, 2017
Post comments count0
Post likes count0

Microsoft Azure Enables NIST CSF Compliance: Identify Function

Matt Rathbun
Matt Rathbun

Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the first in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This first release specifically outlines how to implement the Identify function requirements using the services o...

ComplianceSecurityCybersecurity