0% found this document useful (0 votes)
308 views11 pages

Zero Trust Essentials Ebook - Microsoft

This document discusses Zero Trust security principles and Microsoft's approach to implementing Zero Trust. It covers the key Zero Trust security layers of identity, endpoints, applications, network, infrastructure, and data. Microsoft implements Zero Trust across its products with a focus on identity management using Azure Active Directory, endpoint security and compliance using Microsoft Endpoint Manager, and application security and discovery using tools like Microsoft Cloud App Security. The goal is to provide end-to-end visibility and automated access policies while keeping users productive.

Uploaded by

Imran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
308 views11 pages

Zero Trust Essentials Ebook - Microsoft

This document discusses Zero Trust security principles and Microsoft's approach to implementing Zero Trust. It covers the key Zero Trust security layers of identity, endpoints, applications, network, infrastructure, and data. Microsoft implements Zero Trust across its products with a focus on identity management using Azure Active Directory, endpoint security and compliance using Microsoft Endpoint Manager, and application security and discovery using tools like Microsoft Cloud App Security. The goal is to provide end-to-end visibility and automated access policies while keeping users productive.

Uploaded by

Imran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Zero Trust Essentials eBook

Identity, Endpoints, Applications, Network, Infrastructure and Data are important links in the end to
end chain of the Zero Trust security model. The approach advocates protection at each layer, as they
could be used as entry points or channels to leak sensitive information.

Zero Trust principles


In the past, as an organization, you
may have focused your defenses on
protecting network access with on-
premises firewalls and VPNs, assuming
that everything inside the network was
safe. But today, as data footprints have
expanded to sit off-premises in the
Cloud, or across hybrid networks, the Apply least
Zero Trust security model has evolved privileged access
to address a more holistic set of attack
vectors.

Core to Zero Trust, are the principles


of verify explicitly, apply least
privileged access and always
assume breach.
Verify explicitly Always assume
These principles are applied across a breach
comprehensive control plane to provide
multiple layers of defense.
Zero Trust security layers Identity
Zero Trust starts with identity, verifying
Zero Trust that only the people, devices and
processes that have been granted access
to your resources can access them.

Identity Endpoints
Next comes asssessing the security
compliance of device endpoints -
the hardware accessing your data -
including the IoT systems on the edge.

Endpoints Applications
This oversight applies to your
applications too, whether local or in the
Cloud, as the software-level entry points
to your information.

Applications
Network
Next, there are protections at the
network layer for access to resources –
especially those within your corporate
perimeter.

Network
Infrastructure
Followed by the infrastructure hosting
your data on-premises and in the cloud.
This can be physical or virtual, including
containers and micro-services and
the underlying operating systems and
firmware.
Infrastructure
Data
0101000101010 And finally, protection of the data itself
1010101010101
0101010101010 across your files and content, as well
1010101011011 as structured and unstructured data
1011110101010 wherever it resides
Data
Microsoft’s approach to Zero Trust
Both Microsoft 365 and Azure are designed with Zero Trust as a core architectural
principle. Protections span beyond the Microsoft cloud, to hybrid or even multi-
cloud environments. Fundamental to Microsoft’s approach for Zero Trust is not to
disrupt end users, but work behind the scenes to keep users secure and in their
flow as they work.

The key here is end-to-end visibility and then bringing all this together with threat
intelligence, risk detection and conditional access policies to reason over access
requests and automate response across all of the Zero Trust layers of defense.

Keeping users
protected but in
their flow

Configuring Zero Trust with built-in and best-in-class controls


Identity
Azure Active Directory is the cloud identity service that
assigns identity and conditional access controls for your
people, the service accounts used for apps and processes, and
your devices.

Importantly beyond Microsoft services, Azure AD can provide


a single identity control plane with common authentication
and authorization services for all your apps and services,
including popular SaaS apps, or line-of-business cloud and
Users registered in Azure Active Directory on-premises apps.

This prevents the use of multiple credentials and weak


passwords across different services and helps you to
universally apply strong authentication methods such as
passwordless multi-factor authentication for your users. For
example, biometric methods or a FIDO2 key.

User authenticating with FIDO2 key

Also, to make the authentication process less intrusive to


users, you can take advantage of real-time intelligence at
sign-in with Conditional Access in Azure AD.

Conditional Access lets you set policies to assess the risk


levels. This can be risk of the user or a sign-in, the device
platform, the sign-in location, and apps, to make point-of-
logon decisions and enforce access policies in real time to
Conditional access either block access and require password reset, grant access
but require an additional authentication factor or limit it, for
example, to view-only privileges.
Granting or blocking access through Conditional Access policies

Endpoints
When users access resources including your data and
apps, their endpoints may not be owned and managed
by your organization. If endpoints are not up-to-date, or
appropriately protected, they run the risk of data exfiltration
from unknown apps or services.

Using Microsoft Endpoint Manager, you can make sure


that devices and their installed apps meet your security
and compliance policy requirements, regardless of whether
the device is owned by your organization or the user.
This protection applies no matter where the device may
be connecting from – whether that’s inside the network Connecting from work, home, or
perimeter, including over a VPN, on a home network, or the public internet
public internet.

Microsoft Endpoint Manager gives you easy access to


device and client app management capabilities from
the cloud. It enables secure productivity across all of
your device types including Windows, iOS, macOS,
and Android.
Also, Microsoft Defender with its Extended Detection and Response or XDR
management controls, can identify and contain breaches discovered on an
endpoint and force the device back into a trustworthy state before it is allowed to
connect back to resources.

Containing a breach on a device endpoint with Microsoft Defender

Applications
There are several ways that we help you to apply Zero Trust
protections to your applications. We have already looked
at the benefits of Azure AD as the single entity provider for
authenticated sign-in, as well as the use of conditional access.
These recommendations also apply to your cloud and local
apps that connect to cloud-based services.

Additionally, Microsoft Endpoint Manager can be used to


configure and enforce policy management for both desktop
and mobile apps, including browsers. For example, you can
prevent work related data from being copied and used in
personal apps.
Knowing which apps are used within your organization is critical to mitigating new
vulnerabilities. This includes apps acquired by individuals and teams, often referred
to as Shadow IT. With its catalog of more than 17,000 apps, Microsoft Cloud App
Security (MCAS) can discover and manage Shadow IT services.

Microsoft Cloud App Security dashboard

You can then set policies against your


security requirements to scope how
information may be accessed or shared
by these services. For example, you
can use policies to block actions within
a cloud app, such as downloading
confidential files, or discussing sensitive
topics while using unmanaged devices.

Cloud Discovery in Microsoft Cloud App Security

The policy tab in Microsoft Cloud


App Security
Network
The network is the fourth layer in the Zero Trust security model.
With modern architectures and hybrid services spanning on-premises and multiple
cloud services, virtual networks – or VNETs – and VPNs, we give you a number of
controls, starting with: 1. Network Segmentation to limit the blast radius and
lateral movements of attacks on your network.

Microsegment 1 Microsegment 2

2. Threat protection to harden the


network perimeter from things like
DDoS or brute force attacks, then
the ability to quickly detect and
respond to incidents

DDoS Attack Brute force attack

Outbound Inbound 3. Encryption for all network traffic,


whether it’s internal, inbound or
outbound

Internal
Microsoft offers several solutions to help secure your network, including Azure
Firewall and Azure DDoS Protection to protect your Azure VNET resources.
Importantly, Microsoft’s XDR and SIEM solution, comprising Microsoft Defender
and Azure Sentinel, help you quickly identify and contain security incidents.

Post-breach
hunting in
Azure Sentinel

Infrastructure
The most important consideration with infrastructure is around configuration
management and software updates so that all deployed infrastructure meets your
security and policy requirements.

Here for cloud resources, Azure landing zones, blueprints and policies ensure that
newly deployed infrastructure meets compliance requirements. And the Azure
Security Center along with Log Analytics helps with configuration and software update
management for your on-premises, cross-cloud and cross-platform infrastructure.

Azure Security Center


monitoring of your
resources in Azure,
on-premises, or across-
clouds using Azure Arc
Monitoring is critical for the detection of vulnerabilities, attacks and anomalies. Microsoft Defender
with Azure Sentinel provides depth and breadth threat protection for multi-cloud workloads
enabling automated detection and response.

0100100100100100100100100100100100101110101100101000100100100100100010010

Data 1001001010001001001001011101001001010010101010010101010010010010010111010
001111001010101101011110100101010100001010010100101011101010100101001010001
01001001010101001001010111110010101010111000100100100010000010101010111010
01001010101010101010100101010010101010101001010101010010101010010101010100

At the end of the day Zero Trust is all about understanding and then applying the right controls to
protect your Data.

We give you the controls to limit data access only to the people and processes that need it. The policies
you set, along with real-time monitoring, can then restrict or block the unwanted sharing of sensitive
data and files.

For example, with Microsoft Information Protection, you can automate labeling and classification of
files and content.

Policies are then assigned to labels to trigger protective actions, such as encryption or limiting access,
restricting third party apps and services and much more.

Setting information protection controls in the Example of a policy being enforced as user tries to
Microsoft 365 compliance center share content
Azure Purview
For data outside of Microsoft 365, Azure Purview automatically discovers and maps the data
sitting across your Azure data sources, on-premises, and SaaS data sources; it works with Microsoft
Information Protection to help you to classify your sensitive information.

Azure Purview data lineage map

Classification of sensitive information in


Azure Purview

Additional Resources
Moving to a Zero Trust security model doesn’t have to be all-or-nothing. We recommend using a
phased approach, closing the most exploitable vulnerabilities first.

For hands-on demonstrations of the tools for implementing the Zero Trust security model across the six
layers of defense, watch our Microsoft Mechanics series at aka.ms/ZeroTrustMechanics.

You can also learn more at aka.ms/zerotrust.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy