Auditing – Describe Zero Trust Principles for Microsoft 365

Auditing Auditing determines which actions were executed by which identity, and the time those actions were performed. As described earlier, Microsoft 365 allows administrators to audit actions that are performed in the service regarding file sharing and collaboration, syncing, deletion, and access. A comprehensive zero-trust policy will ensure that auditing data is captured for security ...

Read More

Infrastructure – Describe Zero Trust Principles for Microsoft 365

Infrastructure Applying zero trust principles to your infrastructure means that, as an administrator, you need to take a holistic view of everything that interacts with your organization’s data, including servers, cloud infrastructure and platforms, and development environments. You can use a tool such as Microsoft Defender for Cloud, which is a Cloud Security Posture Management ...

Read More

Encryption – Describe Zero Trust Principles for Microsoft 365

Encryption Encryption, a critical part of the zero-trust strategy, is a mechanism that protects information from unauthorized access. Data stored or transmitted in clear text can potentially be intercepted or modified by bad actors. Encryption can help protect against both unauthorized access and data alteration. Microsoft 365 implements several encryption technologies across the platform. Encryption ...

Read More