Security documentation
Technical guidance to help security professionals build and implement cybersecurity strategy, architecture, and prioritized roadmaps. Read documentation, how-to guides, or browse certifications and trainings.
What's new
Microsoft Build 2023Concept
What is ransomware?How-To Guide
Evaluate and pilot Microsoft 365 DefenderConcept
Azure network securitySecurity job roles
Learning resources and certifications for security roles

Learn how organizational functions play an important role in security
Adopt a Zero Trust architecture
Learn about the Zero Trust security model, its principles, and how to implement a Zero Trust architecture
Learn about the guiding principles of Zero Trust
Get help driving strategy and implementation across your organization
Find resources for customers and partners working with Microsoft 365 for business
Follow a deployment plan for building Zero Trust security with Microsoft 365
Apply the principles of Zero Trust to apps and infrastructure in Azure and other cloud providers
Best practices for securing your DevOps environment
Modernize Security Operations (SecOps/SOC)
Defend against threats by rapidly detecting, responding, and recovering from attacks
Strategy and planning
Continued learning
Secure access and identities
Configure and manage authentication and authorization of identities for users, devices, resources, and applications
Operation
Continued learning
Protect and govern data
Protect data and safeguard sensitive information across platforms, applications, and clouds
What is Microsoft Purview?
Discover and manage data assets
Protect data where it lives
Manage the data lifecycle
Identify and manage insider risk
Improve your compliance posture
Manage privacy risk
Continued learning