last sync: 2025-Apr-29 17:16:02 UTC

Microsoft Managed Control 1096 - Role-Based Security Training | Practical Exercises | Regulatory Compliance - Awareness and Training

Azure BuiltIn Policy definition

Source Azure Portal
Display name Microsoft Managed Control 1096 - Role-Based Security Training | Practical Exercises
Id 420c1477-aa43-49d0-bd7e-c4abdd9addff
Version 1.0.0
Details on versioning
Versioning Versions supported for Versioning: 0
Built-in Versioning [Preview]
Category Regulatory Compliance
Microsoft Learn
Description Microsoft implements this Awareness and Training control
Cloud environments AzureCloud = true
AzureUSGovernment = true
AzureChinaCloud = unknown
Available in AzUSGov The Policy is available in AzureUSGovernment cloud. Version: '1.0.0'
Repository: Azure-Policy 420c1477-aa43-49d0-bd7e-c4abdd9addff
Additional metadata Name/Id: ACF1096 / Microsoft Managed Control 1096
Category: Awareness and Training
Title: Role-Based Security Training | Practical Exercises
Ownership: Customer, Microsoft
Description: The organization includes practical exercises in security training that reinforce training objectives.
Requirements: Role-based training is offered to personnel as defined as appropriate for Microsoft personnel based on their role within the organization. Role-based training, including practical exercises, is offered by the STRIKE program providing 200-400 level security training and best practices for engineering personnel.
Mode Indexed
Type Static
Preview False
Deprecated False
Effect Fixed
audit
RBAC role(s) none
Rule aliases none
Rule resource types IF (2)
Compliance
The following 1 compliance controls are associated with this Policy definition 'Microsoft Managed Control 1096 - Role-Based Security Training | Practical Exercises' (420c1477-aa43-49d0-bd7e-c4abdd9addff)
Control Domain Control Name MetadataId Category Title Owner Requirements Description Info Policy#
NIS2 Cybersecurity_training_7 NIS2_Cybersecurity_training_7 NIS2_Cybersecurity_training_7 Cybersecurity training Basic cybersecurity hygiene and training Customer, Microsoft Security Training Records - Documentation Essential and important entities should adopt a wide range of basic cyber hygiene practices, such as zero-trust principles, software updates, device configuration, network segmentation, identity and access management or user awareness, organise training for their staff and raise awareness concerning cyber threats, phishing or social engineering techniques. Cyber hygiene policies provide the foundations for protecting network and information system infrastructures, hardware, software and online application security, and business or end-user data upon which entities rely. Cyber hygiene policies comprising a common baseline set of practices, including software and hardware updates, password changes, the management of new installs, the limitation of administrator-level access accounts, and the backing-up of data, enable a proactive framework of preparedness and overall safety and security in the event of incidents or cyber threats. ENISA should monitor and analyse Member States’ cyber hygiene policies. 8
Initiatives usage
Initiative DisplayName Initiative Id Initiative Category State Type polSet in AzUSGov
[Preview]: NIS2 32ff9e30-4725-4ca7-ba3a-904a7721ee87 Regulatory Compliance Preview BuiltIn unknown
History none
JSON compare n/a
JSON
api-version=2021-06-01
EPAC