Security documentation

Technical guidance to help security professionals build and implement cybersecurity strategy, architecture, and prioritized roadmaps

Security roles

Learning resources by role

Adopt a Zero Trust architecture

Learn about the Zero Trust security model, its principles, and how to implement a Zero Trust architecture

Adoption framework

Get help driving strategy and implementation across your organization

Modernize Security Operations (SecOps/SOC)

Defend against threats by rapidly detecting, responding, and recovering from attacks

Secure access and identities

Configure and manage authentication and authorization of identities for users, devices, resources, and applications

Protect and govern data

Protect data and safeguard sensitive information across platforms, applications, and clouds