<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Archive on justinverstijnen.nl</title><link>https://justinverstijnen.nl/blog/archive/</link><description>Recent content in Archive on justinverstijnen.nl</description><generator>Hugo</generator><language>en</language><lastBuildDate>Thu, 16 Apr 2026 23:10:23 +0200</lastBuildDate><atom:link href="https://justinverstijnen.nl/blog/archive/index.xml" rel="self" type="application/rss+xml"/><item><title>Microsoft Defender External Attack Surface Management (EASM)</title><link>https://justinverstijnen.nl/microsoft-defender-external-attack-surface-management/</link><pubDate>Sun, 01 Dec 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/microsoft-defender-external-attack-surface-management/</guid><description>&lt;p&gt;&lt;strong&gt;Microsoft Defender External Attack Surface Management (EASM)&lt;/strong&gt; is a security solution for an organization&amp;rsquo;s external attack surfaces. It operates by monitoring security and operational integrity across the following assets:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Websites&lt;/li&gt;
&lt;li&gt;IP addresses&lt;/li&gt;
&lt;li&gt;Domains&lt;/li&gt;
&lt;li&gt;SSL certificates&lt;/li&gt;
&lt;li&gt;Other digital assets&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In addition to these components, EASM can also forward all relevant information and logs to SIEM solutions such as Microsoft Sentinel.&lt;/p&gt;
&lt;p&gt;It is also possible to manually input company-specific data, such as all domain names and IP addresses associated with its services.&lt;/p&gt;</description></item><item><title>Azure Key Vault</title><link>https://justinverstijnen.nl/azure-key-vault/</link><pubDate>Tue, 26 Nov 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/azure-key-vault/</guid><description>&lt;p&gt;Azure Key Vault is a type of vault used to store sensitive technical information, such as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Certificates&lt;/li&gt;
&lt;li&gt;Secrets&lt;/li&gt;
&lt;li&gt;Keys&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;What sets Azure Key Vault apart from a traditional password manager is that it allows software to integrate with the vault. Instead of hardcoding a secret, the software can retrieve it from the vault. Additionally, it is possible to rotate a secret every month, enabling the application to use a different secret each month.&lt;/p&gt;</description></item><item><title>The MITRE ATTACK Framework</title><link>https://justinverstijnen.nl/the-mitre-attck-framework/</link><pubDate>Mon, 25 Nov 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/the-mitre-attck-framework/</guid><description>&lt;p&gt;The MITRE ATTACK (ATT&amp;amp;CK) Framework is a framework which describes all stages and methods cyberattacks attacks are launched on companies in the last 15 years. The main purpose of the framework is to help Red and Blue security teams to harden their systems and to provide a library of known attacks to help mitigate them.&lt;/p&gt;
&lt;p&gt;MITRE is the organization who is in charge of this community-driven framework and is a non-profit organization. ATT&amp;amp;CK stands for:&lt;/p&gt;</description></item><item><title>The Zero Trust-model</title><link>https://justinverstijnen.nl/the-zero-trust-model/</link><pubDate>Mon, 25 Nov 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/the-zero-trust-model/</guid><description>&lt;p&gt;The Zero Trust model is a security model to enhance your security posture by using 3 basic principles, and segmenting aspects of your IT environment into pillars.&lt;/p&gt;
&lt;p&gt;The 3 primary principles are:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Verify Explicitly&lt;/li&gt;
&lt;li&gt;Least privileged access&lt;/li&gt;
&lt;li&gt;Assume Breach&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;At first, those terms seem very unclear to me. To further clarify the principles, i have added some practice examples to further understand what they mean:&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Principle&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;&lt;strong&gt;Outcomes&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Verify Explicity&lt;/td&gt;
 &lt;td&gt;Ensure people are really who they say they are Audit every login attempt from specific users Audit login attempts Block access from non-approved countries&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Least privileged access&lt;/td&gt;
 &lt;td&gt;Assign users only the permissions they need, not more Assign only the roles when they need them using PIM Use custom roles when default roles expose too much permissions&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Assume breach&lt;/td&gt;
 &lt;td&gt;At every level, think about possible breaches Segment your network Password-based authentication only is too weak&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The model is the best illustrated like this:&lt;/p&gt;</description></item><item><title>Introduction to the Microsoft Cloud Security Benchmark (MCSB)</title><link>https://justinverstijnen.nl/introduction-to-the-microsoft-cloud-security-benchmark-mcsb/</link><pubDate>Tue, 16 Apr 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/introduction-to-the-microsoft-cloud-security-benchmark-mcsb/</guid><description>&lt;p&gt;In the modern era like where we are today, security is a very important aspect of every system you manage. Bad security of 1 system can mess with all your systems.&lt;/p&gt;
&lt;p&gt;So have a good overview of how secure your complete IT environment is, Microsoft released the Microsoft Cloud Security Benchmark, which is an collection of high-impact security recommendations you can use to secure your cloud services, even when utilizing a hybrid environment. When using Microsoft Defender for Cloud, this MCSB is included in the recommendations.&lt;/p&gt;</description></item><item><title>Introduction to the Azure Well-Architected Framework</title><link>https://justinverstijnen.nl/introduction-of-azure-well-architected-framework/</link><pubDate>Tue, 02 Apr 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/introduction-of-azure-well-architected-framework/</guid><description>&lt;p&gt;The Azure Well-Architected Framework is a framework to improve the quality of your Microsoft Azure Deployment. This does it by spanning 5 pillars so an architect can determine with IT decision makers how they can get the most Azure with the planned budget.&lt;/p&gt;
&lt;p&gt;The 5 pillars of the Well-Architected Framework are:&lt;/p&gt;
&lt;table&gt;
 &lt;thead&gt;
 &lt;tr&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;th&gt;&lt;/th&gt;
 &lt;/tr&gt;
 &lt;/thead&gt;
 &lt;tbody&gt;
 &lt;tr&gt;
 &lt;td&gt;&lt;strong&gt;Pillar&lt;/strong&gt;&lt;/td&gt;
 &lt;td&gt;&lt;strong&gt;Target&lt;/strong&gt;&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Reliability&lt;/td&gt;
 &lt;td&gt;The ability to recover a system and/or contine to work&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Security&lt;/td&gt;
 &lt;td&gt;Secure the environment in all spots&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Cost Optimization&lt;/td&gt;
 &lt;td&gt;Maximize the value when minimizing the costs&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Operational Excellence&lt;/td&gt;
 &lt;td&gt;The processes that keep a system running&lt;/td&gt;
 &lt;/tr&gt;
 &lt;tr&gt;
 &lt;td&gt;Performance Efficiency&lt;/td&gt;
 &lt;td&gt;The ability to adapt to changes&lt;/td&gt;
 &lt;/tr&gt;
 &lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;img src="https://sajvwebsiteblobstorage.blob.core.windows.net/blog/create-a-catch-all-mailbox-in-exchange-online-2480/jv-media-2480-dfde3a7edc08.png" alt=""&gt;&lt;/p&gt;</description></item><item><title>Cloud Adoption Framework Introduction (CAF)</title><link>https://justinverstijnen.nl/microsoft-azure-cloud-adoption-framework-caf/</link><pubDate>Thu, 04 Jan 2024 00:00:00 +0000</pubDate><guid>https://justinverstijnen.nl/microsoft-azure-cloud-adoption-framework-caf/</guid><description>&lt;p&gt;More and more organizations are moving to the cloud. In order to do this succesful, we can use the Cloud Adoption Framework which is described by Microsoft.&lt;/p&gt;
&lt;p&gt;The framework is a succesful order of processes and guidelines which companys can use to increase the success of adopting the cloud. The framework is described in the diagram below:&lt;/p&gt;
&lt;p&gt;&lt;img src="https://sajvwebsiteblobstorage.blob.core.windows.net/blog/microsoft-azure-cloud-adoption-framework-caf-230/jv-media-230-96e3366cfe69.png" alt="Cloud Adoption Framework"&gt;&lt;/p&gt;
&lt;p&gt;The CAF has the following steps:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Strategy: Define the project, define what you want to achieve and define the business outcomes.&lt;/li&gt;
&lt;li&gt;Plan: Plan your migration, determine the plans and make sure the environment readiness is at a good level.&lt;/li&gt;
&lt;li&gt;Ready (and migrate): Prepare your new cloud environment for planned changes and migrate your workloads to the cloud.&lt;/li&gt;
&lt;li&gt;Optimize: After migrating to the cloud, optimize your environment by using the beste solutions possible and innovate at this level.&lt;/li&gt;
&lt;li&gt;Secure: Improve the security of your workloads and plan your perodical security checks.&lt;/li&gt;
&lt;li&gt;Manage: Manage operations for cloud and hybrid solutions.&lt;/li&gt;
&lt;li&gt;Govern: Govern your environment and its workloads.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr&gt;
&lt;h2 id="intention-of-use"&gt;Intention of use&lt;a class="td-heading-self-link" href="#intention-of-use" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Increase the chance of your cloud success&lt;/li&gt;
&lt;li&gt;Gives you a best practice of how to perform the migration by proven methodology&lt;/li&gt;
&lt;li&gt;Ensures you don&amp;rsquo;t miss a crucial step&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="intended-usersaudience"&gt;Intended users/audience&lt;a class="td-heading-self-link" href="#intended-usersaudience" aria-label="Heading self-link"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;IT Decision makers&lt;/li&gt;
&lt;li&gt;Company Management Teams&lt;/li&gt;
&lt;li&gt;Companies who want to profit from cloud solutions&lt;/li&gt;
&lt;li&gt;Companies that are planning to migrate to the cloud&lt;/li&gt;
&lt;li&gt;Technicians and project managers for planning the migration&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;For more information, check out this page: &lt;a href="https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/"&gt;https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/scenarios/&lt;/a&gt;&lt;/p&gt;</description></item></channel></rss>