{"id":26022,"date":"2025-10-07T10:22:08","date_gmt":"2025-10-07T18:22:08","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2025\/10\/07\/news-19741\/"},"modified":"2025-10-07T10:22:08","modified_gmt":"2025-10-07T18:22:08","slug":"news-19741","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2025\/10\/07\/news-19741\/","title":{"rendered":"New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security"},"content":{"rendered":"<p><strong>Credit to Author: Hammad Rajjoub| Date: Tue, 07 Oct 2025 16:00:00 +0000<\/strong><\/p>\n<p class=\"wp-block-paragraph\">Building on the momentum of our initial launch of the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2025\/08\/06\/sharing-practical-guidance-launching-microsoft-secure-future-initiative-sfi-patterns-and-practices\/\">Microsoft Secure Future Initiative (SFI) patterns and practices<\/a>, this second installment continues our commitment to making security implementation practical and scalable. The first release introduced a foundational library of actionable guidance rooted in proven <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\" target=\"_blank\" rel=\"noreferrer noopener\">architectures like Zero Trust<\/a>. Now, we\u2019re expanding that guidance with new examples that reflect our ongoing learnings\u2014helping customers and partners understand our strategic approach more deeply and apply it effectively in their own environments.<\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-1 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/trust-center\/security\/secure-future-initiative\">Discover more about the Microsoft Secure Future Initiative<\/a><\/div>\n<\/p><\/div>\n<p class=\"wp-block-paragraph\">This next set of SFI patterns and practices articles include practical, actionable guidance built by practitioners, for practitioners, in the areas of network, engineering systems, and security response. Each of the six articles includes details on how Microsoft has improved our security posture in each area so customers, partners, and the broader security community can do the same.<\/p>\n<p class=\"wp-block-paragraph\">\u202f <\/p>\n<figure class=\"wp-block-table\">\n<table class=\"has-fixed-layout\">\n<tbody>\n<tr>\n<td><strong>Pattern name<\/strong> <\/td>\n<td><strong>SFI Pillar<\/strong> <\/td>\n<td><strong>What it helps you do <\/strong> <\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_NetworkIsolation\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Network isolation<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Protect networks <\/td>\n<td>Contain breaches by default. Strongly segment and isolate your network (through per-service ACLs, isolated virtual networks, and more) to prevent lateral movement and limit cyberattackers if they get in.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_SecureAllTenantsAndResources\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Secure all tenants and their resources<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Protect tenants and isolate systems <\/td>\n<td>Help eliminate \u201cshadow\u201d tenants. Apply baseline security policies, such as multifactor authentication (MFA), Conditional Access, and more, to every cloud tenant and retire unused ones, so cyberattackers can\u2019t exploit forgotten, weakly-secured environments.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_HigherSecurityEntraIDApps\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Higher security for Entra ID apps<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Protect tenants and isolate systems <\/td>\n<td>Close identity backdoors. Enforce high security standards for all Microsoft Entra ID (Azure AD) applications\u2014removing unused apps, tightening permissions, and requiring strong authorization\u2014to block common misconfigurations cyberattackers abuse for cross-tenant attacks.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_ZeroTrustSourceCodeAccess\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Zero Trust for source code access<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Protecting engineering systems <\/td>\n<td>Secure the dev pipeline. Require proof-of-presence MFA for critical code commits and merges to help ensure only verified developers can push code and stop cyberattackers from surreptitiously injecting changes.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_ProtectSoftwareSupplyChain\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Protect the software supply chain<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Protecting engineering systems <\/td>\n<td>Lock down builds and dependencies. Govern your continuous integration and continuous delivery (CI\/CD) pipelines and package management\u2014use standardized build templates, internal package feeds, and automated scanning to block supply chain cyberattacks before they reach production.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/aka.ms\/SFI_CentralizeAccessToSecurityLogs\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Centralize access to security logs<\/strong><\/a><strong> <\/strong> <\/td>\n<td>Monitoring and detecting threats <\/td>\n<td>Speed up investigations. Standardize and centralize your log collection (with longer retention) so that security teams have unified visibility and can detect and investigate incidents faster\u2014even across complex, multi-cloud environments.   <\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/figure>\n<h2 class=\"wp-block-heading\" id=\"more-about-sfi-patterns-and-practices\"><strong>More about SFI patterns and practices<\/strong> <\/h2>\n<p class=\"wp-block-paragraph\">Just as software design patterns provide reusable solutions to common engineering problems, SFI patterns and practices offer repeatable, proven approaches to solving complex cybersecurity challenges. Each pattern is crafted to address a specific security risk\u2014legacy infrastructure or inconsistent CI\/CD pipelines\u2014and is grounded in Microsoft\u2019s own experience. Like design patterns in software architecture, these security patterns are modular, extensible, and built for reuse across diverse environments.<\/p>\n<p class=\"wp-block-paragraph\">Additionally, each pattern in the SFI patterns and practices library follows a consistent and purposeful structure. Every article begins with a\u202f<strong>pattern name<\/strong>\u2014a concise handle that captures the essence of the cybersecurity challenge. The <strong>problem<\/strong> section outlines the security risk and its real-world context, helping readers understand why it matters. The <strong>solution<\/strong> describes how Microsoft addressed the issue internally. The <strong>guidance<\/strong> section provides practical recommendations that customers can consider applying in their own environments. Finally, the <strong>implications<\/strong> section outlines the outcomes and trade-offs of implementing the pattern, helping organizations anticipate both the benefits and the operational considerations.<\/p>\n<p class=\"wp-block-paragraph\">This structure offers a framework for understanding, applying, and evolving security practices. <\/p>\n<div class=\"wp-block-embed__wrapper\">\n<div class=\"ms-metrics-youtube-container\" data-video-id=\"qpiCOUbhA3Q\" id=\"ms-metrics-youtube-68e54595184ef\">\n<div class=\"ms-metrics-youtube-player\"><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"next-steps-with-the-secure-future\">Next steps with SFI<\/h2>\n<div class=\"alignright wp-block-bloginabox-theme-kicker\" data-bi-an=\"Kicker Left\">\n<div class=\"kicker\">\n<h2 class=\"kicker__title\"> \t\t\tApril 2025 progress Report\t\t<\/h2>\n<p class=\"kicker__content\"> \t\t\t\t\t\t\t<a \t\t\t\t\thref=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/sfi-april-2025-progress-report.pdf\" \t\t\t\t\tclass=\"kicker__link\" \t\t\t\t\ttarget=\"_blank\" rel=\"noopener noreferrer\"\t\t\t\t> \t\t\t\t\t\tRead the report\t\t\t\t\t\t\t\u2197<\/a> \t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p class=\"wp-block-paragraph\">Security is a journey, and Microsoft is committed to sharing our insights from SFI. Watch for more actionable advice in coming months. SFI patterns and practices provide a roadmap for putting secure architecture into practice. Embracing these approaches enables organizations to advance their security posture, minimize deployment hurdles, and establish environments that are secure by design, by default, and in operations. <\/p>\n<p class=\"wp-block-paragraph\">To get access to the full library, visit our new <a href=\"https:\/\/aka.ms\/SFI_PatternsAndPracticesPage\" target=\"_blank\" rel=\"noreferrer noopener\">SFI patterns and practices<\/a> webpage. And check out the new <a href=\"https:\/\/www.microsoft.com\/trust-center\/security\/secure-future-initiative\" target=\"_blank\" rel=\"noreferrer noopener\">SFI video on our redesigned website<\/a> to hear directly from Microsoft leadership about how we are putting <strong>security above all else<\/strong>.<\/p>\n<h2 class=\"wp-block-heading\" id=\"let-s-build-a-secure-future-together\"><strong>Let\u2019s build a secure future, together <\/strong><\/h2>\n<p class=\"wp-block-paragraph\">Talk to your Microsoft account team to integrate these practices into your roadmap. <\/p>\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-core-buttons-is-layout-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.microsoft.com\/en-us\/trust-center\/security\/secure-future-initiative\">Keep up to date with all the SFI updates<\/a><\/div>\n<\/p><\/div>\n<p class=\"wp-block-paragraph\">To learn more about Microsoft Security solutions, visit our\u202f<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a> Bookmark the\u202f<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u202fto keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and&nbsp;X&nbsp;(<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u202ffor the latest news and updates on cybersecurity.&nbsp;<\/p>\n<p class=\"wp-block-paragraph\">\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/10\/07\/new-microsoft-secure-future-initiative-sfi-patterns-and-practices-practical-guides-to-strengthen-security\/\">New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/10\/07\/new-microsoft-secure-future-initiative-sfi-patterns-and-practices-practical-guides-to-strengthen-security\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Hammad Rajjoub| Date: Tue, 07 Oct 2025 16:00:00 +0000<\/strong><\/p>\n<p>Microsoft Secure Future Initiative (SFI)\u00a0patterns\u00a0and\u00a0practices\u00a0are\u00a0practical, actionable, insights from practitioners for practitioners based on Microsoft\u2019s implementation of Zero Trust through the Microsoft Secure Future Initiatives.\u00a0By adopting these patterns, organizations can accelerate their security maturity, reduce implementation friction, and build systems that are more secure by design, default, and in operation.\u202f\u00a0\u200b<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2025\/10\/07\/new-microsoft-secure-future-initiative-sfi-patterns-and-practices-practical-guides-to-strengthen-security\/\">New Microsoft Secure Future Initiative (SFI) patterns and practices: Practical guides to strengthen security<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-26022","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/26022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=26022"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/26022\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=26022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=26022"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=26022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}