SC-900 Security Compliance

Division of Responsibility

CIA Triad

Four types of threats

Cypher

Cryptopgraphic keys

Salting

In-Transit vs At-Rest Encryption

Security Information and Event Management (SIEM)

Security Orchestration Automated Response (SOAR)

Extended Detection and Response (XDR)

Endpoint Detection and Response (EDR)

Cloud Access Security Brokers (CASB)

Inventory

Attack vectors and attack surfaces

Ingress vs Egress

STRIDE Methodology

Categorizes threats into different categories:

IDS/IPS

MITRE ATT&CK