{"id":111528,"date":"2022-04-14T11:00:00","date_gmt":"2022-04-14T18:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=111528"},"modified":"2023-08-03T15:08:00","modified_gmt":"2023-08-03T22:08:00","slug":"a-clearer-lens-on-zero-trust-security-strategy-part-1","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2022\/04\/14\/a-clearer-lens-on-zero-trust-security-strategy-part-1\/","title":{"rendered":"A clearer lens on Zero Trust security strategy: Part 1"},"content":{"rendered":"\n

Today’s world is flooded with definitions and perspectives on Zero Trust<\/a>, so we are kicking off a blog series to bring clarity to what Zero Trust is and what it means.<\/p>\n\n\n\n

This first blog will draw on the past, present, and future to bring a clear vision while keeping our feet planted firmly on the ground of reality. <\/p>\n\n\n\n

\"An<\/figure>\n\n\n\n

We start off with some observations and insights on how people are seeing Zero Trust, then highlight some great work at the National Institute of Standards and Technology (NIST) to make Zero Trust real using products available today, and then highlight work being done at The Open Group to standardize Zero Trust (including an origin story of The Jericho Forum from Steve Whitlock).<\/p>\n\n\n\n

Perceptions and scope: How people see Zero Trust<\/h2>\n\n\n\n

As we talk to customers and partners, it’s become clear that most people see Zero Trust as either a strategic security transformation or as a specific initiative to modernize access control. <\/p>\n\n\n\n

\"Zero<\/figure>\n\n\n\n

While Zero Trust principles are critical to securing access control to the cloud and digital assets, Zero Trust’s scope doesn\u2019t stop there. The urgent need to modernize security beyond the classic perimeter approach extends to:<\/p>\n\n\n\n