官术网_书友最值得收藏!

Implementing a Zero Trust approach

To close out the chapter, we wanted to touch on a concept known as Zero Trust. The Zero Trust architecture model was created by John Kindervag while he was at Forrester Research Inc. back in 2010. You may be wondering what exactly Zero Trust is. Essentially, it is a model where we trust no one until we can validate who they are, who they are meant to be, and whether they are authorized to have access to the system or information. Effectively implementing a Zero Trust model is going to require a multilayered approach to the security strategy along with the use of the most current and modern technology available. The method of allowing a user to access the environment with only a username and password is outdated and insecure. With Microsoft's version of a Zero Trust model, they are recommending the use of a strong identity, ensuring devices are enrolled within a management tool, enforcing the concept of least privilege, and verifying the health of both devices and services. To support this model, some of the technologies include Azure Active Directory, multi-factor authentication, biometrics, Conditional Access, Microsoft Intune, and Microsoft Defender ATP. As you read through this book, you will find the guidance and instructions that are provided will ultimately lead to a Zero Trust model.

Tip

You can read more about the Zero Trust Microsoft model here: https://www.microsoft.com/en-us/itshowcase/implementing-a-zero-trust-security-model-at-microsoft.

主站蜘蛛池模板: 湖北省| 江油市| 广昌县| 合江县| 赣州市| 广昌县| 泽普县| 博白县| 巴林左旗| 包头市| 黑水县| 潜山县| 新田县| 垫江县| 涡阳县| 南木林县| 阿荣旗| 建阳市| 厦门市| 淮滨县| 淅川县| 莆田市| 肥西县| 莆田市| 西平县| 进贤县| 保山市| 龙海市| 梅州市| 石屏县| 鄄城县| 长葛市| 丘北县| 九江市| 尤溪县| 彩票| 全椒县| 桐乡市| 元氏县| 镇雄县| 马龙县|