Trace Id is missing

Unlock your potential with Microsoft Copilot

Get things done faster and unleash your creativity with the power of AI anywhere you go.
Microsoft Copilot app being utilized to generate pictures of a singing dog, assisting to identify a flower, and helping to generate an email to congratulate a coworker on a promotion.

Implementing a Zero Trust approach with Azure Active Directory

An illustrated technical overview for implementing a Zero Trust approach with Azure Active Directory

Important! Selecting a language below will dynamically change the complete page content to that language.

Download
  • Version:

    1.0

    Date Published:

    6/12/2019

    File Name:

    Implementing-a-Zero-Trust-approach-with-Azure-Active-Directory.pdf

    File Size:

    3.4 MB

    Most organizations are profoundly challenged by the emergence of all types and sizes of disruptive actors in their markets and are forced to transform to survive. Improving agility and developing a culture of continuous change to become able to continuously redefine what is possible and be able to deploy new optimized operating models, is vital for those organizations. Those are the indispensable foundations to become able to better understand the customer expectations, to improve existing and create new customer experiences, to invent new business models and, ultimately, to generate new sources of revenue.

    Digital transformation is therefore a key factor of growth, innovation and differentiation in a market with heightened competition. In this context, the increasing usage of the cloud by these organizations, the use of more and more varied types of device, and more and more mobility scenarios, present new challenges to provide adequate security, as part of the processing and data, that are now, de facto, outside the reassuring boundaries of the firewalls.

    In light of the above, this white paper proposes to:
    • Revisit the term "Zero Trust" and what it covers in its structuring principles,
      Describe how these principles apply to a computer environment to improve end-to-end security,
      Discuss how to translate these principles concretely with Azure Active Directory (Azure AD) and Microsoft security services, products and technologies.
  • Supported Operating Systems

    Apple Mac OS X, Linux, Windows 10

    Not applicable
  • Click the Download button on this page to start downloading this document.
  • Follow Microsoft