{"id":6470,"date":"2021-04-28T22:39:50","date_gmt":"2021-04-28T22:39:50","guid":{"rendered":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/?p=6470"},"modified":"2021-04-28T22:39:50","modified_gmt":"2021-04-28T22:39:50","slug":"zero-trust-for-networking","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","title":{"rendered":"Zero Trust for networking"},"content":{"rendered":"

\"Top-down<\/p>\n

Over the last year, the\u00a0demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels.\u00a0We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn’t necessarily a contained\/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.<\/p>\n

With the trend organizations are looking towards a Zero Trust model, where instead of believing everything behind the corporate firewall is safe, the Zero Trust strategy principals Verify explicitly, Use Least-privileged access and Assume Breach.<\/p>\n

In the Zero Trust model for Networks, there are three key objectives:<\/p>\n

    \n
  1. Be Ready to handle attacks before they happen<\/li>\n
  2. Minimize the extent of the damage and how fast it spreads<\/li>\n
  3. Increase the difficulties of compromising your cloud footprint<\/li>\n<\/ol>\n

    As organizations look to deployment Zero Trust framework for securing networks:<\/p>\n

      \n
    1. Network Segmentation<\/strong>: This includes apps and virtual network segmentation which aims to reduce the attack surface and prevent attackers from moving laterally.<\/li>\n
    2. Encryption:<\/strong> Enforcing encryption on the communication channel between user-to-app or app-to-app with industry standards like TLS\/SSL.<\/li>\n<\/ol>\n
        \n
      1. Threat protection<\/strong>: Employing threat intelligence to help minimize risk from the most sophisticated attacks like bots and malware.<\/li>\n<\/ol>\n

        Get Started on your Zero Trust journey for Networks<\/p>\n

          \n
        1. Watch our Zero Trust approach to secure your cloud and hybrid networks<\/a> webinar<\/li>\n
        2. Evaluate your current Zero Trust maturity stage<\/a> to determine where your organization is and how to move to the next stage<\/li>\n<\/ol>\n

          Access the Zero Trust Deployment Guide for Networks<\/a> for detailed deployment guidance.<\/p>\n","protected":false},"excerpt":{"rendered":"

          Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn’t necessarily a contained\/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.<\/p>\n","protected":false},"author":72,"featured_media":6473,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"categories":[1],"post_tag":[],"content-type":[],"coauthors":[300],"class_list":["post-6470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"\nZero Trust for networking - Microsoft Industry Blogs - Canada<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust for networking - Microsoft Industry Blogs - Canada\" \/>\n<meta property=\"og:description\" content=\"Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn't necessarily a contained\/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\" \/>\n<meta property=\"og:site_name\" content=\"Microsoft Industry Blogs - Canada\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-28T22:39:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1050\" \/>\n\t<meta property=\"og:image:height\" content=\"718\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ModernBiz\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ModernBiz\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\"},\"author\":[{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/author\/modernbiz-editors\/\",\"@type\":\"Person\",\"@name\":\"ModernBiz\"}],\"headline\":\"Zero Trust for networking\",\"datePublished\":\"2021-04-28T22:39:50+00:00\",\"dateModified\":\"2021-04-28T22:39:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\"},\"wordCount\":286,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\",\"url\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\",\"name\":\"Zero Trust for networking - Microsoft Industry Blogs - Canada\",\"isPartOf\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg\",\"datePublished\":\"2021-04-28T22:39:50+00:00\",\"dateModified\":\"2021-04-28T22:39:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage\",\"url\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg\",\"width\":1050,\"height\":718,\"caption\":\"Top-down view of a bearded man in a gray\/blue shirt seated at a desk working on a Surface laptop connected to three large monitors.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zero Trust for networking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#website\",\"url\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/\",\"name\":\"Microsoft Industry Blogs - Canada\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization\",\"name\":\"Microsoft Industry Blogs - Canada\",\"url\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2019\/08\/Microsoft-Logo.png\",\"contentUrl\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2019\/08\/Microsoft-Logo.png\",\"width\":259,\"height\":194,\"caption\":\"Microsoft Industry Blogs - Canada\"},\"image\":{\"@id\":\"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust for networking - Microsoft Industry Blogs - Canada","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust for networking - Microsoft Industry Blogs - Canada","og_description":"Over the last year, the demand for cloud-based services and applications has dramatically increased and the need to scale pushed to new levels. We are moving away from an era where networks were clearly defined and usually specific to a certain location. Now there isn't necessarily a contained\/defined network to secure, but instead a vast portfolio of devices and networks, all linked by the cloud. Cybercriminals however are taking advantage of this shift, with increase occurring in DDoS attacks, ransomware and phishing campaigns.","og_url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","og_site_name":"Microsoft Industry Blogs - Canada","article_published_time":"2021-04-28T22:39:50+00:00","og_image":[{"width":1050,"height":718,"url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg","type":"image\/jpeg"}],"author":"ModernBiz","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ModernBiz","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#article","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/"},"author":[{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/author\/modernbiz-editors\/","@type":"Person","@name":"ModernBiz"}],"headline":"Zero Trust for networking","datePublished":"2021-04-28T22:39:50+00:00","dateModified":"2021-04-28T22:39:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/"},"wordCount":286,"commentCount":0,"publisher":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization"},"image":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/","name":"Zero Trust for networking - Microsoft Industry Blogs - Canada","isPartOf":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage"},"image":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg","datePublished":"2021-04-28T22:39:50+00:00","dateModified":"2021-04-28T22:39:50+00:00","breadcrumb":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#primaryimage","url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg","contentUrl":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2021\/04\/SEC20_Security_029.jpg","width":1050,"height":718,"caption":"Top-down view of a bearded man in a gray\/blue shirt seated at a desk working on a Surface laptop connected to three large monitors."},{"@type":"BreadcrumbList","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/uncategorized\/2021\/04\/28\/zero-trust-for-networking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/"},{"@type":"ListItem","position":2,"name":"Zero Trust for networking"}]},{"@type":"WebSite","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#website","url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/","name":"Microsoft Industry Blogs - Canada","description":"","publisher":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#organization","name":"Microsoft Industry Blogs - Canada","url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2019\/08\/Microsoft-Logo.png","contentUrl":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-content\/uploads\/sites\/23\/2019\/08\/Microsoft-Logo.png","width":259,"height":194,"caption":"Microsoft Industry Blogs - Canada"},"image":{"@id":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/posts\/6470"}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/users\/72"}],"replies":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/comments?post=6470"}],"version-history":[{"count":0,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/posts\/6470\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/media\/6473"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/media?parent=6470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/categories?post=6470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/post_tag?post=6470"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/content-type?post=6470"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-ca\/industry\/blog\/wp-json\/wp\/v2\/coauthors?post=6470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}