Microsoft Security Academy
Learn about Microsoft’s Secure Future Initiative
The Secure Future Initiative (SFI) is a multiyear initiative to evolve the way we design, build, test, and operate our products and services, to achieve the highest possible standards for security.
Read about our progress improving our security culture, governance, standards, and principles from the newly released SFI Progress Report.📢
Table of Contents
This page is organized by SFI’s six key pillars, each representing a critical area of cybersecurity focus.
Protect identities and secrets
Ensure 100% of user accounts are protected with securely managed, phishing-resistant MFA
Ensure 100% of applications are protected with system-managed credentials (e.g., Managed Identity, Managed Certificates)
Ensure identity and public key infrastructure (PKI) systems are ready for post-quantum cryptography
Protect tenants
Maintain the security posture and commercial relationships of tenants by removing all unused, aged, or legacy systems
Protect 100% of acquired and employee-created tenants, commerce accounts, and tenant resources
100% of applications and users have continuous least-privilege access enforcement
Manage 100% of Microsoft Entra ID applications to a high, consistent security bar
Protect networks
Secure 100% of production networks and systems connected to the networks by improving isolation, monitoring, inventory, and secure operations
Apply network isolation and microsegmentation to 100% of production environments, creating additional layers of defense against attackers
Enable customers to easily secure their networks and isolate resources in the cloud
Protect engineering systems
Build and maintain inventory for 100% of the software assets used to deploy and operate Microsoft products and services
100% of access to source code and engineering systems infrastructure is secured through Zero Trust and least-privilege access policies
100% of source code that deploys to production environments is protected through security best practices
Secure development, build, test, and release environments with 100% standardized, governed pipelines and infrastructure isolation.
Monitor and detect threats
Maintain a current inventory across 100% of production infrastructure and services
Retain 100% of security logs for at least two years and make six months of appropriate logs available to customers
Automatically detect and respond to anomalous access, behaviors, and configurations across 100% of production infrastructure and services
Reduce the Time to Mitigate for high-severity cloud security vulnerabilities with accelerated response
Improve the accuracy, effectiveness, transparency, and velocity of public messaging and customer engagement