Zum Hauptinhalt springen

Glossary — IT Carve-Out, NIS2, Zero Trust, Azure & AI

Structured definitions on Microsoft Cloud, IT Security, Enterprise AI and IT carve-out from danad GmbH practice.

Cloud & Infrastructure

Azure Bicep

Azure Bicep is Microsoft's declarative Infrastructure-as-Code language for Azure. It compiles to ARM JSON but is significantly more readable and maintainable. Advantages over Terra

Azure Landing Zone

An Azure Landing Zone is a pre-structured, security- and compliance-aligned Azure tenant baseline that serves as the foundation for cloud migrations. It defines subscription topolo

Azure Virtual Desktop

Azure Virtual Desktop (AVD) is Microsoft's cloud desktop solution. It delivers Windows 10/11 multi-session desktops and remote apps directly from Azure and is the strategic success

CI/CD (Continuous Integration / Continuous Delivery)

CI/CD is the software engineering practice of automatically integrating, testing and shipping code changes to production. Microsoft stack tools: Azure DevOps Pipelines, GitHub Acti

Cloud Migration

Cloud Migration is the relocation of workloads, data and applications from on-premises datacentres to a public cloud (Azure, AWS, GCP). Strategies: Rehost (Lift & Shift), Replatfor

Cloud Readiness Assessment

A Cloud Readiness Assessment is a structured evaluation of a company's technical, organisational and commercial prerequisites for cloud adoption. It assesses application portfolio,

FSLogix Profile Container

FSLogix is Microsoft's user profile management solution for multi-session environments like Azure Virtual Desktop and Windows 365. It stores user profiles as virtual hard disks (VH

Hybrid Cloud

Hybrid Cloud is an IT architecture where on-premises infrastructure and public cloud services work seamlessly together. Typical patterns: ExpressRoute / VPN connections, Azure Arc

Infrastructure as Code (IaC)

Infrastructure as Code (IaC) means defining IT infrastructure through declarative code templates rather than manual click-configuration. Tools: Bicep (Azure-native), Terraform (clo

Microsoft 365 Tenant-to-Tenant Migration

Tenant-to-Tenant Migration is the relocation of Microsoft 365 data (mail, OneDrive, SharePoint, Teams, identities) from one tenant to another — typical in M&A, carve-outs or rebran

Microsoft Cloud Adoption Framework (CAF)

The Microsoft Cloud Adoption Framework (CAF) is Microsoft's standardised methodology for cloud transformations. It defines six phases — Strategy, Plan, Ready, Adopt, Govern, Manage

Microsoft Fabric

Microsoft Fabric is Microsoft's unified data and analytics platform. It combines Data Engineering, Data Science, Real-Time Analytics, Data Warehouse and Power BI in a SaaS product

Terraform

Terraform is HashiCorp's cloud-agnostic Infrastructure-as-Code solution. Unlike Azure Bicep, Terraform supports multi-cloud (Azure + AWS + GCP + 3000+ providers) and is the de-fact

Cybersecurity & Compliance

Backup & Disaster Recovery

Backup & Disaster Recovery (BDR) ensures business continuity during outages and cyber attacks. 2026 best practice: 3-2-1-1-0 rule (3 copies, 2 media, 1 offsite, 1 immutable, 0 veri

BSI IT-Grundschutz

BSI IT-Grundschutz is the German methodology for systematic IT infrastructure protection, published by the Federal Office for Information Security (BSI). It combines standards (200

Data Loss Prevention (DLP)

Data Loss Prevention (DLP) is the continuous prevention of data exfiltration through automated content classification and policy enforcement. In the Microsoft stack: Microsoft Purv

Data Residency

Data Residency refers to the obligation that certain data is stored and processed within a defined geographic area (e.g. EU, Germany, Switzerland). Microsoft addresses this with Az

GDPR / DSGVO

The General Data Protection Regulation (GDPR) — German Datenschutz-Grundverordnung (DSGVO) — has governed personal data processing across the EU since May 2018. Obligations: record

ISO/IEC 27001

ISO/IEC 27001 is the leading international standard for Information Security Management Systems (ISMS). It defines risk-based requirements for organisational structures, policies,

KRITIS (Critical Infrastructure)

KRITIS is the German term for Critical Infrastructure — facilities whose failure would cause significant supply shortages. KRITIS sectors (energy, water, food, IT, health, finance,

Microsoft Defender for Cloud

Microsoft Defender for Cloud is Microsoft's Cloud Workload Protection Platform (CWPP) and Cloud Security Posture Management (CSPM). It continuously assesses security configurations

Microsoft Defender for Endpoint

Microsoft Defender for Endpoint (MDE) is Microsoft's EDR (Endpoint Detection and Response) solution for Windows, macOS, Linux, iOS and Android endpoints. Delivers behaviour analyti

Microsoft Defender for Identity

Microsoft Defender for Identity (MDI) is Microsoft's ITDR (Identity Threat Detection and Response) solution for hybrid identity environments. Detects attacks like Pass-the-Hash, Go

Microsoft Defender XDR

Microsoft Defender XDR (Extended Detection and Response) is Microsoft's integrated threat detection suite. It correlates signals from Defender for Endpoint, Identity, Cloud Apps, O

Microsoft Purview Sensitivity Labels

Sensitivity Labels are Microsoft's classification and protection system for Office documents, email, SharePoint sites, Teams and containers. Labels can enforce encryption, watermar

Microsoft Sentinel

Microsoft Sentinel is Microsoft's cloud-native SIEM/SOAR product. It collects security events from on-premises, cloud and multi-vendor sources, correlates them with AI-based detect

NIS2 Compliance

NIS2 (Network and Information Security Directive 2) is the EU cybersecurity directive mandatory since October 2024 for "essential" and "important" entities. It extends NIS1 with ne

Ransomware Resilience

Ransomware Resilience is the ability to prevent, contain and fully recover from ransomware attacks. Building blocks: immutable backups (3-2-1-1-0 rule), hardened Active Directory t

Shadow IT

Shadow IT refers to applications, cloud services and devices used by employees without IT department knowledge or approval. Risks: data exfiltration, missing compliance, unsecured

SIEM (Security Information and Event Management)

A SIEM aggregates security-relevant logs from the entire IT landscape and correlates them into detection use cases. Market leaders: Microsoft Sentinel, Splunk, IBM QRadar, Elastic

SOC (Security Operations Center)

A Security Operations Center (SOC) is the central unit that continuously monitors, investigates and responds to cybersecurity events. Building one is capital- and staff-intensive (

Zero Trust Architecture

Zero Trust is a security model that explicitly verifies every access — regardless of location, network or device. Core principles: "Never trust, always verify", "Assume breach", "V

M&A IT & Due Diligence

Enterprise AI

Identity & Access

Modern Workplace

Observability & FinOps