Skip to main content
Microsoft Security

Jesper Kråkhede Posts

Jesper Kråkhede
Jesper Kråkhede
Architect, Security Service Line—Compromise Recovery Security Practice
Microsoft Cyber Defense Operations Center.
Published
4 min read

Implementing a Zero Trust strategy after compromise recovery 

After a compromise recovery follows what we call a Security Strategic Recovery. This is the plan for moving forward to get up to date with security posture all over the environment. The plan consists of different components like securing privileged access and extended detection and response, but it all points in the same direction: moving ahead with Zero Trust Strategy over traditional network-based security.