{"id":91974,"date":"2020-09-29T11:00:10","date_gmt":"2020-09-29T18:00:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91974"},"modified":"2023-05-15T23:05:10","modified_gmt":"2023-05-16T06:05:10","slug":"microsoft-advanced-compliance-solutions-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/29\/microsoft-advanced-compliance-solutions-zero-trust-architecture\/","title":{"rendered":"Microsoft Advanced Compliance Solutions in Zero Trust Architecture"},"content":{"rendered":"
Zero Trust revolves around three key principles:\u00a0 verify explicitly, use least privileged access, and assume breach.\u00a0 Microsoft\u2019s Advanced Compliance Solutions<\/a> are an important part of Zero Trust.<\/p>\n This post applies a Zero Trust<\/a> lens to protecting an organization\u2019s sensitive data and maintaining compliance with relevant standards. Ultimately, Zero Trust architecture is a modern approach to security that focuses on security and compliance for assets regardless of their physical or network location, which contrasts with classic approaches that attempt to force all assets on a \u2018secure\u2019 and compliant network.<\/p>\n A Zero Trust strategy should start with Identity and Access Management.\u00a0 Microsoft built Azure Active Directory (AAD) to enable rapid Zero Trust adoption:<\/p>\n Architects focus on applying the Zero Trust principles to protect and monitor six technical pillars of the enterprise including:<\/p>\n In an integrated Microsoft Zero Trust<\/a> solution, AAD and Microsoft Defender for Identity provide protection, monitoring, and trust insights in the User\/Identity Pillar. Microsoft Defender for Endpoints and Intune protect and manage the Device.\u00a0 Azure Security Center and Azure Sentinel monitor, report, and provide automated playbooks to deal with events.<\/p>\n Microsoft\u2019s Advanced Compliance solutions are foundational to Zero Trust as well, particularly when implemented to support Microsoft 365.<\/p>\n Microsoft Information Protection, Insider Risk Management, and Microsoft Cloud App Security are all part of a complete Zero Trust architecture.<\/p>\n Advanced Auditing can increase the visibility around insider or bad actor\u2019s activities with sensitive data like documents and emails as well as increasing the period over which audit data is available for review.<\/p>\n Let\u2019s look closer at these solutions:<\/p>\n Microsoft Information Protection sensitivity labels are fully integrated with our data loss prevention solution, preventing movement of sensitive information at the boundary of the cloud, between Microsoft and third-party clouds, and at the device endpoint (e.g. laptop).<\/p>\n These signals are visualized and actioned by other Microsoft solutions.\u00a0 Insider Risk Management uses its specialized algorithms and machine learning to correlate signal and expose Insider Risks in context.\u00a0 It also provides workflows and visualizations to manage cases.<\/p>\n Insider Risk Management is integrated with AAD and acts on signals from Microsoft Information Protection as well as others in the tenant, providing additional security value from the systems already in place.\u00a0 The alerts generated by the system can be managed with the native case management features or surfaced to Azure Sentinel or third-party systems through the API.<\/p>\n These Advanced Compliance solutions have native visibility into AAD, the Microsoft Tenant, and into each other.\u00a0 For example, Insider Risk Management has visibility into Microsoft Information Protection sensitivity labels.\u00a0 Microsoft Cloud App Security has visibility into and can act on sensitivity labels.<\/p>\n This visibility and machine learning run through the Microsoft Security and Advanced Compliance solutions, making them particularly well suited to a holistic Zero Trust<\/a> architecture.<\/p>\n","protected":false},"excerpt":{"rendered":" Zero Trust architecture starts with Identity and Access Management but it doesn\u2019t end there. Microsoft Advanced Compliance solutions complement Azure Active Directory and Conditional Access with important protections around the data, applications and network pillars. <\/p>\n","protected":false},"author":96,"featured_media":91982,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3668,3685,3689],"products":[3726],"threat-intelligence":[],"tags":[],"coauthors":[2218,1905],"class_list":["post-91974","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-compliance","topic-siem-and-xdr","topic-zero-trust","products-microsoft-sentinel"],"yoast_head":"\n<\/p>\n
\n
<\/p>\n
\n
\n
\n
\n
<\/p>\n
\n
<\/p>\n
\n