{"id":91974,"date":"2020-09-29T11:00:10","date_gmt":"2020-09-29T18:00:10","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=91974"},"modified":"2023-05-15T23:05:10","modified_gmt":"2023-05-16T06:05:10","slug":"microsoft-advanced-compliance-solutions-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2020\/09\/29\/microsoft-advanced-compliance-solutions-zero-trust-architecture\/","title":{"rendered":"Microsoft Advanced Compliance Solutions in Zero Trust Architecture"},"content":{"rendered":"

Zero Trust revolves around three key principles:\u00a0 verify explicitly, use least privileged access, and assume breach.\u00a0 Microsoft\u2019s Advanced Compliance Solutions<\/a> are an important part of Zero Trust.<\/p>\n

This post applies a Zero Trust<\/a> lens to protecting an organization\u2019s sensitive data and maintaining compliance with relevant standards. Ultimately, Zero Trust architecture is a modern approach to security that focuses on security and compliance for assets regardless of their physical or network location, which contrasts with classic approaches that attempt to force all assets on a \u2018secure\u2019 and compliant network.<\/p>\n

A Zero Trust strategy should start with Identity and Access Management.\u00a0 Microsoft built Azure Active Directory (AAD) to enable rapid Zero Trust adoption:<\/p>\n

\"An<\/p>\n

Architects focus on applying the Zero Trust principles to protect and monitor six technical pillars of the enterprise including:<\/p>\n