Describe the Zero-Trust Model – Describe Zero Trust Principles for Microsoft 365

Describe the Zero-Trust Model

Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat.

However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported beyond the corporate network boundary. Firewalls in an office setting are not effective when the data you are trying to protect is on a tablet computer that was left at a restaurant or on the subway.

With that in mind, Microsoft (and the tech industry as a whole) has pivoted from the traditional security perimeter defense perspective to a model called zero trust.

Zero trust is based on the concept of minimizing an organization’s risk footprint by interrogating the security of everything that attempts to access data or services. The zero-trust model treats all new requests as if they are from an untrusted actor until proven otherwise. In other words, never trust, always verify.

Zero Trust Principles

The zero-trust model is based on the following principles:

  • Explicit verification
  • Least-privilege access
  • Assume breach

Read on to find out about each of these principles.

Explicit Verification

Explicit verification means evaluating the authentication and authorization requests. The possible evaluation criteria include user identity, the network location from which the access requests originate, the health or compliance of a device, service, or workload configuration, classification of the requested data, or other characteristics that may present themselves during the verification process.

Least-Privilege Access

The concept of least -privilege access focuses on reducing the standing rights and permissions that a user or device has to access a resource. For example, if an account with a high level of permission is compromised, then everything that the account is authorized to access is at risk. To limit the risk or exposure (sometimes referred to as the blast radius), it’s important to ensure that identities and devices only have the minimum number of rights and permissions necessary.

Least privilege can be combined with technologies that offer programmatic, just-in-time, and just-enough access. That way, users or administrators can request additional rights or privileges for a defined period in order to perform specific activities.

Leave a Reply

Your email address will not be published. Required fields are marked *

Related Posts

Team Insights – Describe the Analytics Capabilities of Microsoft 365

Team Insights In addition to the personal insights available to all users, individuals in managerial roles can access manager-level insights, also referred to as teamwork habits or team insights. These insights arecentered around collective data and trends derived from team members and are presented in an anonymized format. These trends may encompass work-related behaviors, such ...

Read More

Advanced Insights – Describe the Analytics Capabilities of Microsoft 365

Advanced Insights Advanced insights allow business analysts to deep-dive into the data collected by Viva Insights. For example, analysts can write custom queries to explore meeting metrics or other quantitative datasets. Advanced Insights To learn more about Advanced insights features, please see https://learn.microsoft. com/en-us/viva/insights/advanced/introduction-to-advanced-insights. Viva Insights has its own role, Viva Insights admin. With this ...

Read More

Describe Identity Concepts – Understand Identity and Access Management Solutions

Describe Identity Concepts When describing how users access Microsoft 365 services, the identity and authentication processes are the key concepts to understand. In this section, you will learn three core identity models (as well as some sub-features of each) and how they work in the context of Microsoft 365. The three models are as follows: ...

Read More