{"id":93586,"date":"2021-05-24T11:00:50","date_gmt":"2021-05-24T18:00:50","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/\/?p=93586"},"modified":"2023-05-15T23:08:35","modified_gmt":"2023-05-16T06:08:35","slug":"resources-for-accelerating-your-zero-trust-journey","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/05\/24\/resources-for-accelerating-your-zero-trust-journey\/","title":{"rendered":"Resources for accelerating your Zero Trust journey"},"content":{"rendered":"\n
For many organizations, 2020 was the year that finally saw remote work become a reality on a global scale. As many people begin transitioning back to the office, many organizations are thinking about how they can transition from a remote workforce to a more permanent hybrid workplace. We recently conducted a study with over 900 chief information security officers (CISOs) on the state of Zero Trust<\/a> and found that 81 percent say their organization has started or currently has a hybrid work environment in place and that 91 percent plan for their organization to be fully transitioned to hybrid work within the next five years. The era of hybrid work is here to stay. Learn more about our perspective and security efforts in Vasu Jakkal\u2019s blog, Securing a new world of hybrid work: What to know and what to do<\/a>, posted earlier this month.<\/p>\n\n\n\n However, as recent events have shown us, the cybersecurity landscape continues to evolve. Bad actors are getting more sophisticated and the need for a stronger security model has never been more important. Zero Trust is no longer an option, it\u2019s now imperative for organizations that want to protect themselves while providing employees the flexibility they need to be productive.<\/p>\n\n\n\n Implementing a Zero Trust model means transitioning from implicit trust\u2014where everything inside a corporate network is assumed to be safe\u2014to a model that assumes breach and explicitly verifies the security status of identity, endpoint, network, and other resources based on all available signal and data. A contextual, real-time policy helps enforce least-privileged access principles and minimize risks. Zero Trust not only strengthens security but also enables the transformation needed to embrace hybrid work.<\/p>\n\n\n\n I often hear from customers that implementing a Zero Trust security framework can be daunting and that they\u2019re looking for help in creating a roadmap with the right prioritized milestones to maximize investments and positively impact their users. In this post, I\u2019d like to provide an overview of the resources available to help accelerate your Zero Trust readiness and provide actionable guidance.<\/p>\n\n\n\n If you haven\u2019t already, I suggest starting with our Zero Trust Maturity Model whitepaper<\/a>, which breaks down Zero Trust requirements across identities, endpoints, apps, networks, infrastructure, and data. This paper provides a strong starting point to assess your current Zero Trust maturity, prioritize security efforts to maximize impact, and get a foundational understanding of overall capabilities and requirements.<\/p>\n\n\n\n My colleague, Mark Simos, also posted a blog, Zero Trust Strategy\u2014what good looks like<\/a>, based on his experience helping customers transform their security strategies that expands on many of the concepts in the maturity model.<\/p>\n\n\n\n We created the Microsoft Zero Trust Assessment tool<\/a> to help you determine where you are in your Zero Trust implementation journey and provide to-dos and deployment guidance to help reach key milestones. This month, we released an updated version that provides more targeted guidance and a curated list of resources to help you better prioritize milestones based on your current progress. Now, when a gap is identified in your Zero Trust readiness, you\u2019ll see which specific capabilities you need, the Microsoft products and services that can provide those and step-by-step guidance on implementation.<\/p>\n\n\n\n Get specific suggestions for next steps in your Zero Trust adoption with the assessment tool<\/a>.<\/em><\/p>\n\n\n\n This month, we\u2019re kicking off our new Microsoft Mechanics video series focused on Zero Trust. In this series, Jeremy Chapman, Director of Microsoft 365, provides a breakdown of how you can adopt a Zero Trust approach across the six layers of defense\u2014identities, endpoints, apps, networks, infrastructure, and data. This series will share tips and provide hands-on demonstrations of the tools for implementing the Zero Trust security model.<\/p>\n\n\n\n Our first two videos are out now:<\/p>\n\n\n\n Watch our new video series, starting with Microsoft Mechanics Zero Trust Essentials<\/a>.<\/em><\/p>\n\n\n\n Here are some of the other resources we\u2019ve put together as a result of our efforts helping customers, managing our own Zero Trust deployment, and listening to all of you:<\/p>\n\n\n\n For more information about Microsoft Zero Trust, please\u00a0visit our website<\/a> and keep up-to-date with product announcements, technical guidance, planning resources, and more in our Zero Trust blogs<\/a>.<\/p>\n\n\n\n To learn more about Microsoft Security solutions, visit our website<\/a>. Bookmark the Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at @MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":" Embracing Zero Trust is critical to protecting your organization and enabling productivity. Here are our top resources to help accelerate your adoption.<\/p>\n","protected":false},"author":106,"featured_media":93591,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"ms_queue_id":[],"ep_exclude_from_search":false,"_classifai_error":"","_classifai_text_to_speech_error":"","footnotes":""},"content-type":[3662],"topic":[3673,3689],"products":[],"threat-intelligence":[],"tags":[3824,3822],"coauthors":[2174],"class_list":["post-93586","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","content-type-news","topic-identity-and-access-management","topic-zero-trust","tag-hybrid-work","tag-microsoft-security-insights"],"yoast_head":"\nAccelerating your hybrid work readiness with Zero Trust<\/h2>\n\n\n\n
<\/figure>\n\n\n\n
Assess your Zero Trust maturity and plan the next steps in your journey with the updated assessment tool<\/h2>\n\n\n\n
<\/figure>\n\n\n\n
Get up to speed on the essentials of Zero Trust<\/h2>\n\n\n\n
\n
<\/a><\/figure>\n\n\n\n
Other resources<\/h2>\n\n\n\n
\n
Learn more<\/h2>\n\n\n\n