{"id":90085,"date":"2019-10-29T09:00:48","date_gmt":"2019-10-29T16:00:48","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=90085"},"modified":"2023-05-15T23:03:52","modified_gmt":"2023-05-16T06:03:52","slug":"improve-security-zero-trust-access-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2019\/10\/29\/improve-security-zero-trust-access-model\/","title":{"rendered":"Improve security with a Zero Trust access model"},"content":{"rendered":"
Zero Trust is a security model that I believe can begin to turn the tide in the cybersecurity battles. Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. We\u2019ve learned that this isn’t true. Bad actors use methods like password spray and phishing to take advantage of a workforce that must remember too many usernames and passwords. Once behind the corporate firewall, a malicious user can often move freely, gaining higher privileges and access to sensitive data. We simply can\u2019t trust users based on a network as the control plane.<\/p>\n
The good news is that there is a solution. Zero Trust is a security strategy<\/a> that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system\u2014identities, devices, and services\u2014are verified before they are considered trustworthy. It also means that user access is limited to only the data, systems, and applications required for their role. By moving from a model that assumes trust to one that requires verification, we can reduce the number and severity of security breaches.<\/p>\n You can begin implementing a Zero Trust access model now. Expect this to be a multi-year process, but with every action, you\u2019ll make incremental progress that improves your security posture. Start with implementing Multi-Factor Authentication (MFA) to better protect your identities and then develop a phased plan to address identity access, device access, and network access. This is the approach that Microsoft has taken.<\/p>\n Take a look at our Zero Trust access model implementation plan<\/a> for more ideas on how to structure each phase. You can also look at my advice on preparing your organization for passwordless<\/a> for tips on better securing your identities.<\/p>\n We are on this journey together. I will continue to share insights and advice in the coming months and years.<\/p>\n Microsoft Corporate Vice President and CISO, Bret Arsenault, describes how Microsoft is approaching Zero Trust with advice for applying learnings to your organization.<\/p>\n","protected":false},"author":96,"featured_media":90087,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"content-type":[3662],"topic":[3673,3689],"products":[],"threat-intelligence":[],"tags":[3822,3809],"coauthors":[2133],"class_list":["post-90085","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-identity-and-access-management","topic-zero-trust","tag-microsoft-security-insights","tag-security-strategies"],"yoast_head":"\n\n