Assume Breach – Describe Zero Trust Principles for Microsoft 365

Assume Breach

This final piece of the zero-trust model stresses that the design of the network, security, and other access controls should treat every attempt as hostile. As an administrator or architect approaching security with this design philosophy, you may choose to segment your network and application resources, require specific device or network configurations, and ensure that devices and identities pass multiple stages of verification. Once identities and devices are verified, data should be encrypted to safeguard against over-the-air or other methods of snooping on traffic, and sensors should be deployed to detect anomalous activity and isolate risky devices.

Now that you are aware of the zero-trust model and its principles, the next section will look at areas (or pillars) a zero-trust defense strategy should protect.

Zero Trust Pillars

Organizational assets can generally be broken into six categories (or pillars, as Microsoft refers to them):

  • Identity
  • Endpoints
  • Apps
  • Data
  • Infrastructure
  • Network

Over the next few sections, you will explore each of these areas and explore ways to reduce surface attack areas and improve organizational security.

Identity

Cloud services pose new security and access challenges. Traditionally, users have done the following:

  • Only access the organization’s resources inside the organization’s network perimeter
  • Only access the organization’s services that are hosted on the organization’s hardware

With cloud services, enterprise mobility, BYOD objectives, and the consumerization of IT, organizations cannot depend on the traditional way of security and access. Users are now accessing a variety of services from a multitude of vendors from both company-owned and personal devices. Identity is the new security perimeter for companies since it is the ultimate key to access.

From a cloud service perspective, identity defines the users, the permissions they have, and what they can do with those permissions. With that defined, organizations need to plan how to protect users wherever they may be.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Team Insights – Describe the Analytics Capabilities of Microsoft 365

Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...

Read More

Advanced Insights – Describe the Analytics Capabilities of Microsoft 365

Advanced Insights Advanced insights allow business analysts to deep-dive into the data collected by Viva Insights. For example, analysts can write custom queries to explore meeting metrics or other quantitative datasets. Advanced Insights To learn more about Advanced insights features, please see https://learn.microsoft. com/en-us/viva/insights/advanced/introduction-to-advanced-insights. Viva Insights has its own role, Viva Insights admin. With this ...

Read More

Describe Identity Concepts – Understand Identity and Access Management Solutions

Describe Identity Concepts When describing how users access Microsoft 365 services, the identity and authentication processes are the key concepts to understand. In this section, you will learn three core identity models (as well as some sub-features of each) and how they work in the context of Microsoft 365. The three models are as follows: ...

Read More