We are pleased to announce general availability of Application Security Groups (ASG) in all Azure regions including Azure Government. This feature provides security micro-segmentation for your virtual networks in Azure. The detailed announcement can be viewed here: https://azure.microsoft.com/en-us/blog/applicationsecuritygroups/
ASGs provide many security and manageability benefits such as: Network security micro segmentation ASGs enable you to define fine-grained network security policies based on workloads,
We’re continuing to see agencies advance their capabilities using Azure Government. Two agencies have recently issued new Authority to Operate (ATO) designations for Azure Government: the U.S. Air Force with a DoD Impact Level 4 ATO for its Common Computing Environment (CCE) and U.S.
Today, as part of our ongoing support of the Cybersecurity Executive Order, I am pleased to announce the second release in a series of documents on enabling compliance with the NIST Cybersecurity Framework (CSF) through Microsoft Azure services. This release specifically outlines how to implement the Respond function requirements using the services offered by Azure.
Microsoft helping agencies prepare for regulatory revisions As part of Microsoft’s commitment to meet the applicable requirements of the Criminal Justice Information Services (CJIS) Security Policy, it is critical to prepare in advance for future requirements as well. With law enforcement deploying innovative solutions for camera technology,
In Microsoft’s continuous effort to provide resources and guidance to agencies to help them meet their CJIS regulatory requirements, Microsoft collaborated with Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing and former CJIS Information Security Officer (ISO),
Better than a sleeping pill or a riveting read? Welcome back to the third and final post in this series on the CJIS Security Policy. Our last post ended with Policy Area 7 of section 5 concerning Network Diagrams. Policy Area 8 covers Media Protection and how to protect it both in transit and at rest.
Better than a sleeping pill or a riveting read? In our last blog post, Alan Ferretti, CJIS Security Analyst and Subject Matter Expert of the CJIS ACE Division at Diverse Computing, and I covered the first four sections of the CJIS Security Policy.
Better than a sleeping pill or a riveting read? Recently Alan Ferretti and I were talking about compliance for agencies and lamented on the fact that most people malign the CJIS Security Policy as a good cure for insomnia. It seems you can’t attend a conference where a speaker doesn’t make a joke about it.
Für diese Internetseite verwenden wir Cookies für folgende Funktionen:
The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.