Zero Trust Essentials Ebook - Microsoft
Zero Trust Essentials Ebook - Microsoft
Identity, Endpoints, Applications, Network, Infrastructure and Data are important links in the end to
end chain of the Zero Trust security model. The approach advocates protection at each layer, as they
could be used as entry points or channels to leak sensitive information.
Identity Endpoints
Next comes asssessing the security
compliance of device endpoints -
the hardware accessing your data -
including the IoT systems on the edge.
Endpoints Applications
This oversight applies to your
applications too, whether local or in the
Cloud, as the software-level entry points
to your information.
Applications
Network
Next, there are protections at the
network layer for access to resources –
especially those within your corporate
perimeter.
Network
Infrastructure
Followed by the infrastructure hosting
your data on-premises and in the cloud.
This can be physical or virtual, including
containers and micro-services and
the underlying operating systems and
firmware.
Infrastructure
Data
0101000101010 And finally, protection of the data itself
1010101010101
0101010101010 across your files and content, as well
1010101011011 as structured and unstructured data
1011110101010 wherever it resides
Data
Microsoft’s approach to Zero Trust
Both Microsoft 365 and Azure are designed with Zero Trust as a core architectural
principle. Protections span beyond the Microsoft cloud, to hybrid or even multi-
cloud environments. Fundamental to Microsoft’s approach for Zero Trust is not to
disrupt end users, but work behind the scenes to keep users secure and in their
flow as they work.
The key here is end-to-end visibility and then bringing all this together with threat
intelligence, risk detection and conditional access policies to reason over access
requests and automate response across all of the Zero Trust layers of defense.
Keeping users
protected but in
their flow
Endpoints
When users access resources including your data and
apps, their endpoints may not be owned and managed
by your organization. If endpoints are not up-to-date, or
appropriately protected, they run the risk of data exfiltration
from unknown apps or services.
Applications
There are several ways that we help you to apply Zero Trust
protections to your applications. We have already looked
at the benefits of Azure AD as the single entity provider for
authenticated sign-in, as well as the use of conditional access.
These recommendations also apply to your cloud and local
apps that connect to cloud-based services.
Microsegment 1 Microsegment 2
Internal
Microsoft offers several solutions to help secure your network, including Azure
Firewall and Azure DDoS Protection to protect your Azure VNET resources.
Importantly, Microsoft’s XDR and SIEM solution, comprising Microsoft Defender
and Azure Sentinel, help you quickly identify and contain security incidents.
Post-breach
hunting in
Azure Sentinel
Infrastructure
The most important consideration with infrastructure is around configuration
management and software updates so that all deployed infrastructure meets your
security and policy requirements.
Here for cloud resources, Azure landing zones, blueprints and policies ensure that
newly deployed infrastructure meets compliance requirements. And the Azure
Security Center along with Log Analytics helps with configuration and software update
management for your on-premises, cross-cloud and cross-platform infrastructure.
0100100100100100100100100100100100101110101100101000100100100100100010010
Data 1001001010001001001001011101001001010010101010010101010010010010010111010
001111001010101101011110100101010100001010010100101011101010100101001010001
01001001010101001001010111110010101010111000100100100010000010101010111010
01001010101010101010100101010010101010101001010101010010101010010101010100
At the end of the day Zero Trust is all about understanding and then applying the right controls to
protect your Data.
We give you the controls to limit data access only to the people and processes that need it. The policies
you set, along with real-time monitoring, can then restrict or block the unwanted sharing of sensitive
data and files.
For example, with Microsoft Information Protection, you can automate labeling and classification of
files and content.
Policies are then assigned to labels to trigger protective actions, such as encryption or limiting access,
restricting third party apps and services and much more.
Setting information protection controls in the Example of a policy being enforced as user tries to
Microsoft 365 compliance center share content
Azure Purview
For data outside of Microsoft 365, Azure Purview automatically discovers and maps the data
sitting across your Azure data sources, on-premises, and SaaS data sources; it works with Microsoft
Information Protection to help you to classify your sensitive information.
Additional Resources
Moving to a Zero Trust security model doesn’t have to be all-or-nothing. We recommend using a
phased approach, closing the most exploitable vulnerabilities first.
For hands-on demonstrations of the tools for implementing the Zero Trust security model across the six
layers of defense, watch our Microsoft Mechanics series at aka.ms/ZeroTrustMechanics.