{"id":5263,"date":"2022-05-21T09:59:37","date_gmt":"2022-05-21T01:59:37","guid":{"rendered":"https:\/\/ixyzero.com\/blog\/?p=5263"},"modified":"2022-05-21T09:59:37","modified_gmt":"2022-05-21T01:59:37","slug":"microsoft-%e7%9a%84%e5%ae%89%e5%85%a8%e7%9b%b8%e5%85%b3%e8%b5%84%e6%ba%90%e6%95%b4%e7%90%86","status":"publish","type":"post","link":"https:\/\/ixyzero.com\/blog\/archives\/5263.html","title":{"rendered":"Microsoft \u7684\u5b89\u5168\u76f8\u5173\u8d44\u6e90\u6574\u7406"},"content":{"rendered":"\n<p>=Start=<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u7f18\u7531\uff1a<\/h4>\n\n\n\n<p>\u524d\u4e24\u5929\u5728\u670b\u53cb\u5708\u91cc\u770b\u5230\u4e00\u4e2a\u4ecb\u7ecdMicrosoft\u7684\u7f51\u7edc\u5b89\u5168\u67b6\u6784\u4f53\u7cfb\u7684\u89e3\u8bfb\u6587\u7ae0\uff0c\u624d\u77e5\u9053Microsoft\u5f88\u65e9\u5e76\u4e14\u7ecf\u5e38\u6027\u7684\u5728\u5206\u4eab\u5b83\u5728\u4f01\u4e1a\u5b89\u5168\u3001\u4e91\u5b89\u5168\u65b9\u9762\u7684\u4e00\u4e9b\u5b9e\u8df5\u548c\u7ecf\u9a8c\uff08\u6211\u7684\u773c\u754c\u548c\u89c1\u8bc6\u8fd8\u662f\u77ed\u4e86\uff09\u3002\u867d\u7136\u5b83\u8fd9\u4e48\u505a\u7684\u4e00\u4e2a\u521d\u8877\u5728\u4e8e\u63a8\u5e7f\u81ea\u5bb6\u7684\u4e91Azure\u548c\u5176\u5b83\u5b89\u5168\u4ea7\u54c1\uff0c\u4f46<strong>\u5bf9\u4e8e\u666e\u901a\u5b89\u5168\u4ece\u4e1a\u4eba\u5458\u4ee5\u53ca\u60f3\u7cfb\u7edf\u6027\u5b66\u4e60\u548c\u4e86\u89e3\u7f51\u7edc\u5b89\u5168\u4f53\u7cfb\u3001\u7b56\u7565\u548c\u5b9e\u65bd\u8def\u7ebf\u7b49\u77e5\u8bc6\u7684\u4eba\u6765\u8bf4\uff0cMicrosoft\u63d0\u4f9b\u7684\u8fd9\u4e9b\u8d44\u6e90\u975e\u5e38\u6709\u7528\u4e14\u5b9d\u8d35<\/strong>\uff08<mark style=\"background-color:rgba(0, 0, 0, 0);color:#8a0c0c\" class=\"has-inline-color\">\u4e00\u822c\u4eba\u662f\u6ca1\u6709\u673a\u4f1a\u63a5\u89e6\u548c\u4e86\u89e3\u5927\u4f01\u4e1a\u662f\u5982\u4f55\u505a\u5b89\u5168\u7684\uff0c\u4ee5\u53ca\u5b89\u5168\u7684\u6700\u4f73\u5b9e\u8df5\u8be5\u662f\u4ec0\u4e48\u6837\u2014\u2014\u8fd9\u4e9b\u5185\u5bb9\u7531Microsoft\/Google\/Amazon\u7b49\u9876\u7ea7\u516c\u53f8\u6765\u5b9a\u4e49\u548c\u63cf\u8ff0\u624d\u8db3\u591f\u53ef\u4fe1\u548c\u53ef\u9760\uff0c\u56e0\u4e3a\u5b83\u4eec\u5728\u516c\u53f8\u53d1\u5c55\u58ee\u5927\u7684\u8fc7\u7a0b\u4e2d\u4f1a\u9762\u4e34\u5404\u79cd\u5404\u6837\u7684\u5b89\u5168\u98ce\u9669\uff0c\u5b83\u4eec\u6709\u8db3\u591f\u7684\u52a8\u529b\u548c\u8d44\u6e90\u6765\u5e94\u5bf9\/\u7f13\u89e3\u8fd9\u4e9b\u98ce\u9669\uff0c\u5b83\u4eec\u5bf9\u5b89\u5168\u7684\u7406\u89e3\u7a0b\u5ea6\u8fdc\u6bd4\u4e00\u822c\u516c\u53f8\u8981\u6df1\u5165\u3002\u6c42\u5176\u4e0a\uff0c\u5f97\u5176\u4e2d\uff1b\u6c42\u5176\u4e2d\uff0c\u5f97\u5176\u4e0b\uff1b\u6c42\u5176\u4e0b\uff0c\u5fc5\u8d25\u3002\u60f3\u8981\u5b66\u4e60\u63d0\u9ad8\u5c31\u8981\u6311\u597d\u5b66\u4e60\u7684\u76ee\u6807\uff0c\u5426\u5219\u5b66\u4e60\u6548\u679c\u53ef\u80fd\u4e0d\u8fbe\u9884\u671f<\/mark>\uff09\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">\u6b63\u6587\uff1a<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u89e3\u7b54\uff1a<\/h5>\n\n\n\n<p>\u8fd9\u7bc7\u6587\u7ae0\u4ec5\u5217\u51fa\u6211\u8fd1\u671f\u5728\u770b\u4e14\u89c9\u5f97\u5f88\u6709\u53c2\u8003\u4ef7\u503c\u7684\u6587\u6863\u94fe\u63a5\u548c\u6982\u8981\uff0c\u4e00\u65b9\u9762\u539f\u6587\uff08\u82f1\u6587\u597d\u7684\u5efa\u8bae\u76f4\u63a5\u770b\u82f1\u6587\u6587\u6863\uff0c\u4e2d\u6587\u6587\u6863\u7684\u90e8\u5206\u5185\u5bb9\u662f\u7531\u673a\u5668\u7ffb\u8bd1\uff0c\u53ef\u80fd\u4f1a\u5f71\u54cd\u4f60\u5bf9\u5185\u5bb9\u7684\u7406\u89e3\uff09\u5185\u5bb9\u66f4\u591a\u66f4\u5168\uff0c\u4e0d\u540c\u7ecf\u9a8c\u7684\u4eba\u80fd\u83b7\u53d6\u5230\u7684\u4fe1\u606f\u5f88\u53ef\u80fd\u4e0d\u4e00\u6837\uff1b\u53e6\u4e00\u65b9\u9762\u539f\u6587\u662f\u5728\u4e0d\u65ad\u66f4\u65b0\u7684\uff0c\u4e14\u66f4\u65b0\u9891\u7387\u8fd8\u633a\u9ad8\uff0c\u770b\u539f\u6587\u80fd\u83b7\u53d6\u5230\u6700\u65b0\u7684\u4fe1\u606f\u3002<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1-\u96f6\u4fe1\u4efb<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u4e3a\u4f55\u91c7\u7528\u96f6\u4fe1\u4efb<\/h5>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8a0c0c\" class=\"has-inline-color\">\u5f53\u4eca\u7ec4\u7ec7\u9700\u8981\u4e00\u79cd\u65b0\u7684\u5b89\u5168\u6a21\u578b\uff0c\u4ee5\u66f4\u6709\u6548\u5730\u9002\u5e94\u590d\u6742\u7684\u73b0\u4ee3\u73af\u5883\u3001\u652f\u6301\u6df7\u5408\u5de5\u4f5c\u573a\u6240\uff0c\u4ee5\u4fdd\u62a4\u4efb\u4f55\u4f4d\u7f6e\u7684\u7528\u6237\u3001\u8bbe\u5907\u3001\u5e94\u7528\u548c\u6570\u636e\u3002\u5c24\u5176\u662f\u5728\u75ab\u60c5\u7684\u9634\u4e91\u8fd8\u672a\u6d88\u6563\uff0c\u8fdc\u7a0b\u529e\u516c\u65e2\u662f\u4e00\u79cd\u8d8b\u52bf\u3001\u66f4\u662f\u4e00\u79cd\u73b0\u5b9e\u7684\u60c5\u51b5\u4e0b\u3002<\/mark><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u968f\u65f6\u968f\u5730\u9ad8\u6548\u5de5\u4f5c<br>\u4f7f\u7528\u6237\u80fd\u591f\u968f\u65f6\u968f\u5730\u5728\u4efb\u4f55\u8bbe\u5907\u4e0a\u66f4\u5b89\u5168\u5730\u5de5\u4f5c\u3002<\/li><li>\u4e91\u8fc1\u79fb<br>\u901a\u8fc7\u667a\u80fd\u5b89\u5168\u6027\u5b9e\u73b0\u6570\u5b57\u8f6c\u578b\uff0c\u4ee5\u9002\u5e94\u8d8a\u6765\u8d8a\u590d\u6742\u7684\u73af\u5883\u3002<\/li><li>\u98ce\u9669\u7f13\u89e3<br>\u6d88\u9664\u5b89\u5168\u6f0f\u6d1e\uff0c\u4f7f\u6a2a\u5411\u79fb\u52a8\u7684\u98ce\u9669\u964d\u81f3\u6700\u4f4e\u3002<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">\u96f6\u4fe1\u4efb\u539f\u5219<\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>\u8fdb\u884c\u663e\u5f0f\u9a8c\u8bc1 &#8211; Verify explicitly<br><\/strong>\u59cb\u7ec8\u57fa\u4e8e\u6240\u6709\u53ef\u7528\u6570\u636e\u8fdb\u884c\u8eab\u4efd\u9a8c\u8bc1\u548c\u6388\u6743\uff0c\u5305\u62ec\u7528\u6237\u8eab\u4efd\u3001\u4f4d\u7f6e\u3001\u8bbe\u5907\u8fd0\u884c\u72b6\u51b5\u3001\u670d\u52a1\u6216\u5de5\u4f5c\u8d1f\u8f7d\u3001\u6570\u636e\u5206\u7c7b\u4ee5\u53ca\u5f02\u5e38\u60c5\u51b5\u3002<\/li><li><strong>\u4f7f\u7528\u6700\u5c11\u7279\u6743\u8bbf\u95ee &#8211; Use least privileged access<br><\/strong>\u901a\u8fc7\u5373\u65f6(JIT,just-in-time)\u548c\u6700\u5c0f\u53ef\u7528\u8bbf\u95ee\u6743\u9650(JEA,just-enough-access)\u3001\u57fa\u4e8e\u98ce\u9669\u7684\u81ea\u9002\u5e94\u7b56\u7565\u4ee5\u53ca\u6570\u636e\u4fdd\u62a4\u6765\u9650\u5236\u7528\u6237\u7684\u8bbf\u95ee\uff0c\u4ee5\u5e2e\u52a9\u4fdd\u62a4\u6570\u636e\u5e76\u4fdd\u969c\u751f\u4ea7\u529b\u3002<\/li><li><strong>\u5047\u5b9a\u5df2\u7ecf\u6cc4\u9732 &#8211; Assume breach<br><\/strong>\u6700\u5c0f\u5316\u6cc4\u6f0f\u5f71\u54cd\u534a\u5f84\u5e76\u5bf9\u8bbf\u95ee\u6743\u9650\u8fdb\u884c\u5206\u6bb5\u3002\u9a8c\u8bc1\u7aef\u5230\u7aef\u52a0\u5bc6\uff0c\u5e76\u901a\u8fc7\u6570\u636e\u5206\u6790\u83b7\u53d6\u53ef\u89c1\u6027\uff0c\u4fc3\u8fdb\u5a01\u80c1\u68c0\u6d4b\u5e76\u589e\u5f3a\u9632\u5fa1\u3002<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">\u5fae\u8f6f\u5bf9\u4e8e\u96f6\u4fe1\u4efb\u7684\u5b9a\u4e49<\/h5>\n\n\n\n<p><mark style=\"background-color:rgba(0, 0, 0, 0);color:#8a0c0c\" class=\"has-inline-color\">\u96f6\u4fe1\u4efb\u6a21\u578b\u5047\u5b9a\u5df2\u7ecf\u6cc4\u9732\uff08\u800c\u4e0d\u662f\u5047\u5b9a\u516c\u53f8\u9632\u706b\u5899\u80cc\u540e\u7684\u6240\u6709\u5185\u5bb9\u5747\u5b89\u5168\uff09\u5e76\u5c06\u6bcf\u4e2a\u8bf7\u6c42\u90fd\u89c6\u4e3a\u6e90\u81ea\u5f00\u653e\u7f51\u7edc\u3002\u96f6\u4fe1\u4efb\u6559\u5bfc\u6211\u4eec\uff0c\u65e0\u8bba\u8bf7\u6c42\u6e90\u81ea\u4f55\u5904\u6216\u4e0d\u7ba1\u8bbf\u95ee\u4f55\u79cd\u8d44\u6e90\uff0c\u90fd\u5e94\u575a\u5b88\u201c\u6c38\u4e0d\u4fe1\u4efb\uff0c\u59cb\u7ec8\u9a8c\u8bc1\u201d\u7684\u539f\u5219\u3002\u6bcf\u4e2a\u8bbf\u95ee\u8bf7\u6c42\u5728\u6388\u4e88\u8bbf\u95ee\u4e4b\u524d\u90fd\u5e94\u8fdb\u884c\u5b8c\u6574\u7684\u8eab\u4efd\u9a8c\u8bc1\u3001\u6388\u6743\u548c\u52a0\u5bc6\u3002\u5e94\u7528\u5fae\u5206\u6bb5\u548c\u6700\u5c11\u7279\u6743\u8bbf\u95ee\u539f\u5219\u4ee5\u6700\u5927\u9650\u5ea6\u5730\u51cf\u5c11\u6a2a\u5411\u79fb\u52a8\u3002\u5229\u7528\u4e30\u5bcc\u7684\u667a\u80fd\u548c\u5206\u6790\u8fdb\u884c\u68c0\u6d4b\u5e76\u53ca\u65f6\u54cd\u5e94\u5f02\u5e38\u60c5\u51b5\u3002<\/mark><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">\u96f6\u4fe1\u4efb\u7684\u8986\u76d6\u8303\u56f4<\/h5>\n\n\n\n<ul class=\"wp-block-list\"><li>\u8eab\u4efd-Identities<br>\u5bf9\u4f60\u7684\u6240\u6709\u6570\u5b57\u8d44\u4ea7\u5e94\u7528\u5f3a\u8eab\u4efd\u9a8c\u8bc1\u65b9\u5f0f\u6765\u9a8c\u8bc1\u548c\u4fdd\u62a4\u6bcf\u4e2a\u8eab\u4efd\u3002<\/li><li>\u7ec8\u7aef\u8bbe\u5907-Endpoints<br>\u8981\u83b7\u5f97\u53ef\u5165\u7f51\u8bbe\u5907\u7684\u76f8\u5173\u4fe1\u606f\u3002\u5728\u6388\u4e88\u8bbf\u95ee\u6743\u9650\u4e4b\u524d\uff0c\u786e\u4fdd\u662f\u5408\u89c4\u548c\u5b89\u5168\u8fd0\u884c\u7684\u72b6\u6001\u3002<\/li><li>\u5e94\u7528-Apps<br>\u53d1\u73b0\u5f71\u5b50IT\uff0c\u786e\u4fdd\u5408\u9002\u7684\u5e94\u7528\u7a0b\u5e8f\u6743\u9650\uff0c\u8bbf\u95ee\u8981\u57fa\u4e8e\u5b9e\u65f6\u5206\u6790\uff0c\u5e76\u76d1\u63a7\u548c\u63a7\u5236\u7528\u6237\u7684\u884c\u4e3a\u3002<\/li><li>\u6570\u636e-Data<br>\u4ece\u57fa\u4e8e\u8fb9\u754c\u7684\u6570\u636e\u4fdd\u62a4\u8f6c\u53d8\u4e3a\u6570\u636e\u9a71\u52a8\u7684\u4fdd\u62a4\u3002\u4f7f\u7528\u7a0b\u5e8f\/\u4eba\u5de5\u667a\u80fd\u5bf9\u6570\u636e\u8fdb\u884c\u5206\u7c7b\u548c\u6807\u8bb0\u3002\u6839\u636e\u7ec4\u7ec7\u7b56\u7565\u52a0\u5bc6\u548c\u9650\u5236\u6570\u636e\u8bbf\u95ee\u3002<\/li><li>\u57fa\u7840\u8bbe\u65bd-Infrastructure<br>\u4f7f\u7528\u9065\u6d4b\u6280\u672f\u6765\u68c0\u6d4b\u653b\u51fb\u548c\u5f02\u5e38\uff0c\u81ea\u52a8\u963b\u6b62\u548c\u6807\u8bb0\u5371\u9669\u884c\u4e3a\uff0c\u5e76\u91c7\u7528\u6700\u5c0f\u7279\u6743\u8bbf\u95ee\u539f\u5219\u3002<\/li><li>\u7f51\u7edc-Network<br>\u786e\u4fdd\u8bbe\u5907\u548c\u7528\u6237\u4e0d\u4f1a\u4ec5\u4ec5\u56e0\u4e3a\u5728\u5185\u90e8\u7f51\u7edc\u4e0a\u800c\u53d7\u5230\u4fe1\u4efb\u3002\u52a0\u5bc6\u6240\u6709\u5185\u90e8\u901a\u4fe1\uff0c\u901a\u8fc7\u7b56\u7565\u9650\u5236\u8bbf\u95ee\uff0c\u5e76\u4f7f\u7528\u5fae\u5206\u6bb5\u548c\u5b9e\u65f6\u5a01\u80c1\u68c0\u6d4b\u3002<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">2-Microsoft \u5b89\u5168\u6700\u4f73\u5b9e\u8df5<\/h4>\n\n\n\n<p>\u6cbb\u7406\u3001\u98ce\u9669\u548c\u5408\u89c4 &#8211; Governance, risk, and compliance<\/p>\n\n\n\n<p>\u5b89\u5168\u64cd\u4f5c &#8211; Security operations<\/p>\n\n\n\n<p>\u8eab\u4efd\u548c\u8bbf\u95ee\u7ba1\u7406 &#8211; Identity and access management<\/p>\n\n\n\n<p>\u7f51\u7edc\u5b89\u5168 &#8211; Network security and containment<\/p>\n\n\n\n<p>\u7279\u6743\u8bbf\u95ee &#8211; Privileged administration<\/p>\n\n\n\n<p>\u4eba\u4e3a\u64cd\u4f5c\u7684\u52d2\u7d22\u8f6f\u4ef6 &#8211; Ransomware and extortion<\/p>\n\n\n\n<p>\u4fe1\u606f\u4fdd\u62a4\u548c\u5b58\u50a8 &#8211; Information protection and storage<\/p>\n\n\n\n<p>\u5e94\u7528\u7a0b\u5e8f\u548c\u670d\u52a1 &#8211; Applications and services<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3-Azure \u5b89\u5168\u57fa\u51c6 (v3)<\/h4>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>ASB \u63a7\u5236\u9886\u57df<\/th><th>\u8bf4\u660e<\/th><\/tr><\/thead><tbody><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-network-security\">\u7f51\u7edc\u5b89\u5168\u6027 (NS)<\/a><\/td><td>\u7f51\u7edc\u5b89\u5168\u5305\u542b\u7528\u4e8e\u4fdd\u62a4 Azure \u7f51\u7edc\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u4fdd\u62a4\u865a\u62df\u7f51\u7edc\u3001\u5efa\u7acb\u4e13\u7528\u8fde\u63a5\u3001\u963b\u6b62\u548c\u51cf\u5c11\u5916\u90e8\u653b\u51fb\u4ee5\u53ca\u4fdd\u62a4 DNS\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-identity-management\">\u8eab\u4efd\u7ba1\u7406 (IM)<\/a><\/td><td>\u6807\u8bc6\u7ba1\u7406\u5305\u62ec\u7528\u4e8e\u4f7f\u7528 Azure Active Directory \u5efa\u7acb\u5b89\u5168\u6807\u8bc6\u548c\u8bbf\u95ee\u63a7\u5236\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5176\u4e2d\u5305\u62ec\u4f7f\u7528\u5355\u4e00\u767b\u5f55\u3001\u5f3a\u8eab\u4efd\u9a8c\u8bc1\u3001\u7528\u4e8e\u5e94\u7528\u7a0b\u5e8f\u7684\u6258\u7ba1\u6807\u8bc6\uff08\u548c\u670d\u52a1\u4e3b\u4f53\uff09\u3001\u6761\u4ef6\u8bbf\u95ee\u548c\u5e10\u6237\u5f02\u5e38\u76d1\u89c6\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-privileged-access\">\u7279\u6743\u8bbf\u95ee (PA)<\/a><\/td><td>\u7279\u6743\u8bbf\u95ee\u5305\u62ec\u7528\u4e8e\u4fdd\u62a4\u5bf9\u4f60\u7684 Azure \u79df\u6237\u548c\u8d44\u6e90\u7684\u7279\u6743\u8bbf\u95ee\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u4e00\u7cfb\u5217\u7528\u4e8e\u907f\u514d\u7ba1\u7406\u6a21\u578b\u3001\u7ba1\u7406\u5e10\u6237\u548c\u7279\u6743\u8bbf\u95ee\u5de5\u4f5c\u7ad9\u9762\u4e34\u6709\u610f\u548c\u65e0\u610f\u7684\u98ce\u9669\u7684\u63a7\u5236\u63aa\u65bd\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-data-protection\">\u6570\u636e\u4fdd\u62a4 (DP)<\/a><\/td><td>\u6570\u636e\u4fdd\u62a4\u6db5\u76d6\u63a7\u5236\u9759\u6001\u6570\u636e\u4fdd\u62a4\u3001\u4f20\u8f93\u4e2d\u7684\u6570\u636e\u4fdd\u62a4\u4ee5\u53ca\u901a\u8fc7\u6388\u6743\u8bbf\u95ee\u673a\u5236\u5b9e\u73b0\u7684\u6570\u636e\u4fdd\u62a4\uff0c\u5305\u62ec\u4f7f\u7528 Azure \u4e2d\u7684\u8bbf\u95ee\u63a7\u5236\u3001\u52a0\u5bc6\u4ee5\u53ca\u5bc6\u94a5\u548c\u8bc1\u4e66\u7ba1\u7406\u6765\u5b9e\u73b0\u5bf9\u654f\u611f\u6570\u636e\u8d44\u4ea7\u7684\u53d1\u73b0\u3001\u5206\u7c7b\u3001\u4fdd\u62a4\u548c\u76d1\u89c6\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-asset-management\">\u8d44\u4ea7\u7ba1\u7406 (AM)<\/a><\/td><td>\u8d44\u4ea7\u7ba1\u7406\u5305\u62ec\u7528\u4e8e\u786e\u4fdd Azure \u8d44\u6e90\u5b89\u5168\u53ef\u89c1\u6027\u548c\u6cbb\u7406\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u4ee5\u4e0b\u51e0\u65b9\u9762\u7684\u5efa\u8bae\uff1a\u5b89\u5168\u4eba\u5458\u7684\u6743\u9650\u3001\u5bf9\u8d44\u4ea7\u6e05\u5355\u7684\u5b89\u5168\u8bbf\u95ee\uff0c\u4ee5\u53ca\u7ba1\u7406\u5bf9\u670d\u52a1\u548c\u8d44\u6e90\u7684\u5ba1\u6279\uff08\u76d8\u70b9\u3001\u8ddf\u8e2a\u548c\u66f4\u6b63\uff09\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v2-logging-threat-detection\">\u65e5\u5fd7\u8bb0\u5f55\u548c\u5a01\u80c1\u68c0\u6d4b (LT)<\/a><\/td><td>\u65e5\u5fd7\u8bb0\u5f55\u548c\u5a01\u80c1\u68c0\u6d4b\u6db5\u76d6\u4e86\u7528\u4e8e\u68c0\u6d4b Azure \u4e0a\u7684\u5a01\u80c1\u4ee5\u53ca\u542f\u7528\u3001\u6536\u96c6\u548c\u5b58\u50a8 Azure \u670d\u52a1\u7684\u5ba1\u6838\u65e5\u5fd7\u7684\u63a7\u4ef6\uff0c\u5305\u62ec\u4f7f\u7528\u63a7\u4ef6\u542f\u7528\u68c0\u6d4b\u3001\u8c03\u67e5\u548c\u4fee\u6b63\u8fc7\u7a0b\uff0c\u4ee5\u5229\u7528 Azure \u670d\u52a1\u4e2d\u7684\u672c\u673a\u5a01\u80c1\u68c0\u6d4b\u751f\u6210\u9ad8\u8d28\u91cf\u7684\u8b66\u62a5\uff1b\u5b83\u8fd8\u5305\u62ec\u4f7f\u7528 Azure Monitor \u6536\u96c6\u65e5\u5fd7\uff0c\u4f7f\u7528 Azure Sentinel \u96c6\u4e2d\u8fdb\u884c\u5b89\u5168\u5206\u6790\u3001\u65f6\u95f4\u540c\u6b65\u548c\u65e5\u5fd7\u4fdd\u7559\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-incident-response\">\u4e8b\u4ef6\u54cd\u5e94 (IR)<\/a><\/td><td>\u4e8b\u4ef6\u54cd\u5e94\u5305\u62ec\u5bf9\u4e8b\u4ef6\u54cd\u5e94\u751f\u547d\u5468\u671f\uff08\u51c6\u5907\u3001\u68c0\u6d4b\u3001\u5206\u6790\u3001\u5305\u542b\u548c\u4e8b\u540e\u6d3b\u52a8\uff09\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u4f7f\u7528 Microsoft Defender for Cloud \u548c Sentinel \u7b49 Azure \u670d\u52a1\u81ea\u52a8\u6267\u884c\u4e8b\u4ef6\u54cd\u5e94\u8fc7\u7a0b\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-posture-vulnerability-management\">\u6001\u52bf\u548c\u6f0f\u6d1e\u7ba1\u7406 (PV)<\/a><\/td><td>\u72b6\u51b5\u548c\u6f0f\u6d1e\u7ba1\u7406\u4fa7\u91cd\u4e8e\u8bc4\u4f30\u548c\u6539\u8fdb Azure \u5b89\u5168\u72b6\u51b5\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u6f0f\u6d1e\u626b\u63cf\u3001\u6e17\u900f\u6d4b\u8bd5\u548c\u4fee\u6b63\uff0c\u4ee5\u53ca Azure \u8d44\u6e90\u4e2d\u7684\u5b89\u5168\u914d\u7f6e\u8ddf\u8e2a\u3001\u62a5\u544a\u548c\u66f4\u6b63\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-endpoint-security\">\u7ec8\u7aef\u5b89\u5168 (ES)<\/a><\/td><td>\u7ec8\u7ed3\u70b9\u5b89\u5168\u4fdd\u62a4\u5bf9\u7ec8\u7ed3\u70b9\u68c0\u6d4b\u548c\u54cd\u5e94\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u5728 Azure \u73af\u5883\u4e2d\u5bf9\u7ec8\u7ed3\u70b9\u4f7f\u7528\u7ec8\u7ed3\u70b9\u68c0\u6d4b\u548c\u54cd\u5e94 (EDR) \u548c\u53cd\u6076\u610f\u8f6f\u4ef6\u670d\u52a1\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-backup-recovery\">\u5907\u4efd\u548c\u6062\u590d (BR)<\/a><\/td><td>\u5907\u4efd\u548c\u6062\u590d\u5305\u62ec\u7528\u4e8e\u786e\u4fdd\u5728\u4e0d\u540c\u670d\u52a1\u5c42\u6267\u884c\u3001\u9a8c\u8bc1\u548c\u4fdd\u62a4\u6570\u636e\u548c\u914d\u7f6e\u5907\u4efd\u7684\u63a7\u5236\u63aa\u65bd\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-devops-security\">DevOps \u5b89\u5168\u6027 (DS)<\/a><\/td><td>DevOps \u5b89\u5168\u6027\u6db5\u76d6 DevOps \u8fc7\u7a0b\u4e2d\u4e0e\u5b89\u5168\u5de5\u7a0b\u548c\u64cd\u4f5c\u76f8\u5173\u7684\u63a7\u5236\u63aa\u65bd\uff0c\u5305\u62ec\u5728\u90e8\u7f72\u9636\u6bb5\u4e4b\u524d\u90e8\u7f72\u5173\u952e\u5b89\u5168\u6027\u68c0\u67e5\uff08\u5982\u9759\u6001\u5e94\u7528\u7a0b\u5e8f\u5b89\u5168\u6027\u6d4b\u8bd5\u3001\u6f0f\u6d1e\u7ba1\u7406\uff09\uff0c\u4ee5\u786e\u4fdd\u6574\u4e2a DevOps \u8fc7\u7a0b\u7684\u5b89\u5168\uff1b\u5b83\u8fd8\u5305\u62ec\u5e38\u89c1\u4e3b\u9898\uff0c\u4f8b\u5982\u5a01\u80c1\u5efa\u6a21\u548c\u8f6f\u4ef6\u4f9b\u5e94\u5b89\u5168\u3002<\/td><\/tr><tr><td><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/security-controls-v3-governance-strategy\">\u6cbb\u7406\u548c\u7b56\u7565 (GS)<\/a><\/td><td>\u6cbb\u7406\u548c\u7b56\u7565\u63d0\u4f9b\u7684\u6307\u5bfc\u53ef\u786e\u4fdd\u4f7f\u7528\u4e00\u81f4\u7684\u5b89\u5168\u7b56\u7565\u548c\u8bb0\u5f55\u5728\u6848\u7684\u6cbb\u7406\u65b9\u6cd5\u6765\u6307\u5bfc\u548c\u7ef4\u6301\u5b89\u5168\u4fdd\u969c\uff0c\u5305\u62ec\u4e3a\u4e0d\u540c\u7684\u4e91\u5b89\u5168\u529f\u80fd\u3001\u7edf\u4e00\u7684\u6280\u672f\u7b56\u7565\u4ee5\u53ca\u652f\u6301\u7b56\u7565\u548c\u6807\u51c6\u5efa\u7acb\u89d2\u8272\u548c\u8d23\u4efb\u3002<\/td><\/tr><\/tbody><\/table><figcaption>Azure\u5b89\u5168\u63a7\u5236<\/figcaption><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">4-\u5982\u4f55\u57fa\u4e8e Azure \u505a\u5b89\u5168<\/h4>\n\n\n\n<h5 class=\"wp-block-heading\">\u6784\u60f3\u5b89\u5168\u7684\u6700\u7ec8\u72b6\u6001<\/h5>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"458\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2022\/05\/secure-methodology-1024x458.png\" alt=\"\" class=\"wp-image-5264\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/secure-methodology-1024x458.png 1024w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/secure-methodology-300x134.png 300w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/secure-methodology-768x344.png 768w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/secure-methodology.png 1204w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>\u4e1a\u52a1\u5bf9\u9f50(Business alignment)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u98ce\u9669\u6d1e\u5bdf\uff1a \u5c06\u5b89\u5168\u89c1\u89e3\u548c\u98ce\u9669\u4fe1\u53f7\/\u6e90\u4e0e\u4e1a\u52a1\u8ba1\u5212\u534f\u8c03\u4e00\u81f4\u3002\u786e\u4fdd\u901a\u8fc7\u53ef\u91cd\u590d\u7684\u8fc7\u7a0b\u5411\u6240\u6709\u56e2\u961f\u8bb2\u8ff0\u8fd9\u4e9b\u89c1\u89e3\uff0c\u5e76\u4f7f\u5404\u56e2\u961f\u8d1f\u8d23\u6539\u8fdb\u3002<\/li><li>\u5b89\u5168\u96c6\u6210\uff1a \u901a\u8fc7\u53ef\u91cd\u590d\u7684\u8fc7\u7a0b\u548c\u7ec4\u7ec7\u6240\u6709\u7ea7\u522b\u7684\u6df1\u5c42\u5408\u4f5c\u5173\u7cfb\uff0c\u5c06\u5b89\u5168\u77e5\u8bc6\u3001\u6280\u80fd\u548c\u89c1\u89e3\u66f4\u6df1\u5165\u5730\u96c6\u6210\u5230\u4e1a\u52a1\u548c IT \u73af\u5883\u7684\u65e5\u5e38\u8fd0\u8425\u4e2d\u3002<\/li><li>\u4e1a\u52a1\u5f39\u6027\uff1a \u4e13\u6ce8\u4e8e\u786e\u4fdd\u7ec4\u7ec7\u80fd\u591f\u5728\u653b\u51fb\u671f\u95f4\u7ee7\u7eed\u8fd0\u8425\uff08\u5373\u4f7f\u662f\u5728\u964d\u7ea7\u7684\u72b6\u6001\uff09\uff0c\u5e76\u4e14\u7ec4\u7ec7\u80fd\u591f\u8fc5\u901f\u9000\u56de\u5230\u6b63\u5e38\u8fd0\u8425\u72b6\u6001\u3002<\/li><\/ul>\n\n\n\n<p>\u5b89\u5168\u539f\u5219(Security disciplines)<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>\u8bbf\u95ee\u63a7\u5236\uff1a \u5e94\u7528\u7f51\u7edc\u548c\u6807\u8bc6\u4f1a\u521b\u5efa\u8bbf\u95ee\u8fb9\u754c\u548c\u5206\u6bb5\uff0c\u4ee5\u964d\u4f4e\u4efb\u4f55\u5b89\u5168\u8fdd\u89c4\u64cd\u4f5c\u7684\u9891\u7387\u548c\u8303\u56f4<\/li><li>\u5b89\u5168\u64cd\u4f5c\uff1a \u76d1\u89c6 IT \u64cd\u4f5c\u4ee5\u68c0\u6d4b\u3001\u54cd\u5e94\u8fdd\u89c4\u64cd\u4f5c\u5e76\u5b9e\u73b0\u6062\u590d\u3002 \u4f7f\u7528\u6570\u636e\u6301\u7eed\u964d\u4f4e\u8fdd\u89c4\u98ce\u9669<\/li><li>\u8d44\u4ea7\u4fdd\u62a4\uff1a \u6700\u5927\u7a0b\u5ea6\u5730\u4fdd\u62a4\u6240\u6709\u8d44\u4ea7\uff08\u57fa\u7840\u7ed3\u6784\u3001\u8bbe\u5907\u3001\u6570\u636e\u3001\u5e94\u7528\u7a0b\u5e8f\u3001\u7f51\u7edc\u548c\u6807\u8bc6\uff09\uff0c\u4ee5\u6700\u5927\u7a0b\u5ea6\u5730\u964d\u4f4e\u6574\u4e2a\u73af\u5883\u7684\u98ce\u9669<\/li><li>\u5b89\u5168\u6cbb\u7406\uff1a \u59d4\u6258\u51b3\u7b56\u4f1a\u52a0\u901f\u521b\u65b0\u5e76\u5e26\u6765\u65b0\u7684\u98ce\u9669\u3002\u76d1\u89c6\u51b3\u7b56\u3001\u914d\u7f6e\u548c\u6570\u636e\u4ee5\u6cbb\u7406\u5bf9\u6574\u4e2a\u73af\u5883\u3001\u6574\u4e2a\u9879\u76ee\u7ec4\u5408\u4e2d\u7684\u6240\u6709\u5de5\u4f5c\u8d1f\u8f7d\u7684\u51b3\u7b56\u3002<\/li><li>\u5b89\u5168\u521b\u65b0\uff1a \u968f\u7740\u7ec4\u7ec7\u91c7\u7528 DevOps \u6a21\u578b\u6765\u52a0\u901f\u521b\u65b0\uff0c\u5b89\u5168\u6027\u5fc5\u987b\u6210\u4e3a DevSecOps \u8fc7\u7a0b\u4e0d\u53ef\u6216\u7f3a\u7684\u4e00\u90e8\u5206\uff0c\u5e76\u5c06\u5b89\u5168\u4e13\u4e1a\u77e5\u8bc6\u548c\u8d44\u6e90\u76f4\u63a5\u96c6\u6210\u5230\u6b64\u9ad8\u901f\u5468\u671f\u4e2d\u3002\u8fd9\u6d89\u53ca\u5230\u5c06\u4e00\u4e9b\u51b3\u7b56\u4ece\u96c6\u4e2d\u7684\u56e2\u961f\u8f6c\u79fb\u5230\u4ee5\u5de5\u4f5c\u8d1f\u8f7d\u4e3a\u4e2d\u5fc3\u7684\u56e2\u961f\u3002<\/li><\/ul>\n\n\n\n<h5 class=\"wp-block-heading\">\u65b9\u6cd5<\/h5>\n\n\n\n<p>\u98ce\u9669\u6d1e\u5bdf &#8211; Risk insights<br>\u5b89\u5168\u96c6\u6210 &#8211; Security integration<br>\u4e1a\u52a1\u5f39\u6027 &#8211; Business resilience<br>\u8bbf\u95ee\u63a7\u5236 &#8211; Access control<br>\u5b89\u5168\u64cd\u4f5c &#8211; Security operations<br>\u8d44\u4ea7\u4fdd\u62a4 &#8211; Asset protection<br>\u5b89\u5168\u6cbb\u7406 &#8211; Security governance<br>\u5b89\u5168\u521b\u65b0 &#8211; Innovation security<br>DevSecOps\u63a7\u5236 &#8211; DevSecOps controls<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5-Microsoft \u7f51\u7edc\u5b89\u5168\u53c2\u8003\u4f53\u7cfb\u7ed3\u6784<\/h4>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/ixyzero.com\/blog\/wp-content\/uploads\/2022\/05\/mcra-page1-1024x576.png\" alt=\"\" class=\"wp-image-5265\" srcset=\"https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/mcra-page1-1024x576.png 1024w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/mcra-page1-300x169.png 300w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/mcra-page1-768x432.png 768w, https:\/\/ixyzero.com\/wp-content\/uploads\/2022\/05\/mcra-page1.png 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h5 class=\"wp-block-heading\">\u53c2\u8003\u94fe\u63a5\uff1a<\/h5>\n\n\n\n<p>\u96f6\u4fe1\u4efb<br><a href=\"https:\/\/www.microsoft.com\/zh-cn\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.microsoft.com\/zh-cn\/security\/business\/zero-trust<\/a><\/p>\n\n\n\n<p>\u5b89\u5168\u6587\u6863<br><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/security\/<\/a><\/p>\n\n\n\n<p>Security in the Microsoft Cloud Adoption Framework for Azure<br><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/azure\/cloud-adoption-framework\/secure\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/zh-cn\/azure\/cloud-adoption-framework\/secure\/<\/a><\/p>\n\n\n\n<p>Azure \u5b89\u5168\u57fa\u51c6 (v3) \u6982\u8ff0<br><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/overview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/zh-cn\/security\/benchmark\/azure\/overview<\/a><\/p>\n\n\n\n<p>Security rapid modernization plan<br><a href=\"https:\/\/docs.microsoft.com\/en-us\/security\/compass\/security-rapid-modernization-plan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/en-us\/security\/compass\/security-rapid-modernization-plan<\/a><\/p>\n\n\n\n<p>Microsoft \u5b89\u5168\u6700\u4f73\u5b9e\u8df5<br><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/compass\/compass\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/zh-cn\/security\/compass\/compass<\/a><\/p>\n\n\n\n<p>Microsoft \u7f51\u7edc\u5b89\u5168\u53c2\u8003\u4f53\u7cfb\u7ed3\u6784<br><a href=\"https:\/\/docs.microsoft.com\/zh-cn\/security\/cybersecurity-reference-architecture\/mcra\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/docs.microsoft.com\/zh-cn\/security\/cybersecurity-reference-architecture\/mcra<\/a><br><a href=\"https:\/\/aka.ms\/mcra\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/aka.ms\/mcra<\/a><\/p>\n\n\n\n<p>=END=<\/p>\n","protected":false},"excerpt":{"rendered":"<p>=Start= \u7f18\u7531\uff1a \u524d\u4e24\u5929\u5728\u670b\u53cb\u5708\u91cc\u770b\u5230\u4e00\u4e2a\u4ecb\u7ecdMicrosoft\u7684\u7f51\u7edc\u5b89\u5168\u67b6\u6784\u4f53\u7cfb\u7684\u89e3\u8bfb\u6587\u7ae0\uff0c\u624d\u77e5\u9053Mi [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,25],"tags":[1820,37,1505,1821,1506],"class_list":["post-5263","post","type-post","status-publish","format-standard","hentry","category-knowledgebase-2","category-security","tag-microsoft","tag-security","tag-zerotrust","tag-1821","tag-1506"],"views":3469,"_links":{"self":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/comments?post=5263"}],"version-history":[{"count":1,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5263\/revisions"}],"predecessor-version":[{"id":5266,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/posts\/5263\/revisions\/5266"}],"wp:attachment":[{"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/media?parent=5263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/categories?post=5263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ixyzero.com\/blog\/wp-json\/wp\/v2\/tags?post=5263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}