Empower your users to work more securely anywhere and anytime, on any device.
Today’s organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever they’re located.
Assess the Zero Trust maturity stage of your organization and receive targeted milestone guidance, plus a curated list of resources and solutions to move forward in your comprehensive security posture.
Instead of assuming everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an open network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.” Every access request is fully authenticated, authorized, and encrypted before granting access. Microsegmentation and least privileged access principles are applied to minimize lateral movement. Rich intelligence and analytics are utilized to detect and respond to anomalies in real time.
Verify and secure each identity with strong authentication across your entire digital estate.
Move from perimeter-based data protection to data-driven protection. Use intelligence to classify and label data. Encrypt and restrict access based on organizational policies.
Use telemetry to detect attacks and anomalies, automatically block and flag risky behavior, and employ least privilege access principles.
Ensure devices and users aren’t trusted just because they’re on an internal network. Encrypt all internal communications, limit access by policy, and employ microsegmentation and real-time threat detection.
Learn about Zero Trust, the six areas of defense, and how Microsoft products can help in the first episode of Microsoft Mechanics’ Zero Trust Essentials series with host Jeremy Chapman.
Alex Simons, Corporate Vice President for Identity Security at Microsoft, and Steve Turner, analyst at Forrester Research, discuss the adoption of Zero Trust and offer practical advice for organizations to get started.
Microsoft has adopted a Zero Trust strategy to secure corporate and customer data. The implementation centers on strong user identity, device health verification, validation of app health, and least-privilege access to resources and services.
Take the next steps in your organization’s end-to-end implementation with our Zero Trust Guidance Center docs for deployment, integration, and app development best practices.
Get the latest research on how and why organizations are adopting Zero Trust to help inform your strategy, uncover collective progress and prioritizations, and gain insights on this rapidly evolving space.
A holistic approach to Zero Trust should extend to your entire digital estate – inclusive of identities, endpoints, network, data, apps, and infrastructure. Zero Trust architecture serves as a comprehensive end-to-end strategy and requires integration across the elements.
The foundation of Zero Trust security is Identities. Both human and non-human identities need strong authorization, connecting from either personal or corporate Endpoints with compliant device, together requesting access based on strong policies grounded in Zero Trust principles of explicit verification, least privilege access, and assumed breach.
As a unified policy enforcement, the Zero Trust Policy intercepts the request, and explicitly verifies signals from all 6 foundational elements based on policy configuration and enforces least privileged access. Signals include the role of the user, location, device compliance, data sensitivity, application sensitivity and much more. In additional to telemetry and state information, the risk assessment from threat protection feeds into the policy engine to automatically respond to threats in real-time. Policy is enforced at the time of access and continuously evaluated throughout the session.
This policy is further enhanced by Policy Optimization. Governance and Compliance are critical to a strong Zero Trust implementation. Security Posture Assessment and Productivity Optimization are necessary to measure the telemetry throughout the services and systems.
The telemetry and analytics feeds into the Threat Protection system. Large amounts of telemetry and analytics enriched by threat intelligent generates high quality risk assessments that can either be manually investigated or automated. Attacks happen at cloud speed – your defense systems must act at cloud speed and humans just can’t react quickly enough or sift through all the risks. The risk assessment feeds into the policy engine for real-time automated threat protection, and additional manual investigation if needed.
Traffic filtering and segmentation is applied to the evaluation and enforcement from the Zero Trust policy before access is granted to any public or private Network. Data classification, labeling, and encryption should be applied to emails, documents, and structured data. Access to Apps should be adaptive, whether SaaS or on-premises. Runtime control is applied to Infrastructure, with serverless, containers, IaaS, PaaS, and internal sites, with just-in-time (JIT) and Version Controls actively engaged.
Finally, telemetry, analytics, and assessment from the Network, Data, Apps, and Infrastructure are fed back into the Policy Optimization and Threat Protection systems.