End To End Trust

Creating a Safer, More Trusted Internet

United States   Change | All Microsoft Sites

What Is End to End Trust?

End to End Trust is Microsoft's vision for a safer, more trusted Internet. This vision can only be achieved through broad cross-industry collaboration and alignment. In the End to End Trust white paper we outline three areas of focus needed to realize this vision:

  • Security and privacy fundamentals
  • Technology innovations
  • Social, economic, political, and IT alignment
The End to End Trust Vision

Scott Charney
Corporate Vice President,
Trustworthy Computing, Microsoft

"The End to End Trust Vision"
Running time: 14:31
Watch the video

SECURITY AND PRIVACY FUNDAMENTALS

SECURITY AND PRIVACY FUNDAMENTALS

Our goal is to build more secure software with privacy in mind. We use the following to guide our development activities:

  • The Security Development Lifecycle
  • Privacy Guidelines for Developing Software Products and Services
  • Defense in depth
  • Threat mitigation

Security Development Progress

TECHNOLOGY INNOVATIONS

TECHNOLOGY INNOVATIONS

Three key elements are needed to create greater trust on the Internet:

  • A trusted stack with security rooted in hardware
  • The ability to establish trust between systems end-to-end
  • In-person proofing and an identity metasystem

Technology Innovation Progress

SOCIAL, ECONOMIC, POLITICAL, AND; IT ALIGNMENT

SOCIAL, ECONOMIC, POLITICAL, AND IT ALIGNMENT

To enable change, technological innovation must be aligned with social, economic, political, and IT forces. To that end we work to engage in dialogue, collaboration, and consensus-building with customers, partners, industry, and governments.

Collaboration Progress

Internet Health

END TO END TRUST IN DEPTH
  • Creating a More Trusted Internet
    Article
    Download: XPS | PDF

  • Establishing End to End Trust
    White Paper
    Download: XPS | PDF

  • What We've Learned So Far
    Article
    Download: XPS | PDF

  • Trustworthy Computing - The Beginning
    Article
    Download: XPS | PDF

  • Rethinking Cyber Threats and Strategies
    White Paper
    Download: XPS | PDF

  • Collective Defense: Applying Public Health Models to the Internet
    White Paper
    Download: XPS | PDF


Was This Information Useful?