{"id":5991,"date":"2023-07-18T12:31:58","date_gmt":"2023-07-18T19:31:58","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=5991"},"modified":"2023-10-10T13:41:48","modified_gmt":"2023-10-10T20:41:48","slug":"microsofts-digital-security-team-answers-your-top-10-questions-on-zero-trust","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/microsofts-digital-security-team-answers-your-top-10-questions-on-zero-trust\/","title":{"rendered":"Microsoft\u2019s digital security team answers your Top 10 questions on Zero Trust"},"content":{"rendered":"

\"MicrosoftOur internal digital security team at Microsoft spends a fair amount of time talking to enterprise customers who face similar challenges when it comes to managing and securing a globally complex enterprise using a Zero Trust security model<\/a>. While every organization is unique, and Zero Trust isn\u2019t a \u201cone size fits all\u201d approach, nearly every CIO, CTO, or CISO that we talk to is curious to learn more about our best practices.<\/p>\n

We thought it would be useful to share our answers to the Top 10 Zero Trust questions from customers across the globe.<\/p>\n

It\u2019s surprising to us how many companies haven\u2019t embraced multifactor authentication. It\u2019s the first step we took on our Zero Trust journey.<\/p>\n

– Mark Skorupa, principal program manager<\/p>\n<\/blockquote>\n

If you had to pick, what are your top three Zero Trust best practices?<\/strong><\/p>\n

Microsoft\u2019s approach to Zero Trust means we don\u2019t assume any identity or device on our corporate network is secure, we continually verify it.<\/p>\n

With that as context, our top three practices revolve around the following:<\/p>\n