Summary

Completed

Summary and Resources

In this module, you've learned how to build an overall identity security strategy with zero trust in mind. You have learned different strategies for designing, defining, and recommending an organizational security strategy and architecture. You should now be able to:

  • Secure access to cloud resources

  • Recommend an identity store for security

  • Recommend a secure authentication and authorization strategy

  • Secure conditional access

  • Design a strategy for role assignment and delegation

  • Define Identity governance for access reviews and entitlement management

  • Design a security strategy for privileged role access to infrastructure

  • Design a security strategy for privileged activities

Learn more with Azure documentation

Learn more with self-paced training