{"id":8832,"date":"2023-05-23T06:51:13","date_gmt":"2023-05-23T13:51:13","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8832"},"modified":"2023-06-29T11:31:36","modified_gmt":"2023-06-29T18:31:36","slug":"verifying-identity-in-a-zero-trust-model","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/verifying-identity-in-a-zero-trust-model\/","title":{"rendered":"Verifying identity in a Zero Trust model internally at Microsoft"},"content":{"rendered":"
Identity-driven security is a core pillar of our Zero Trust model.<\/p>\n
Identities define the Zero Trust security boundary, and we use identity as the primary factor in how we allow access to corporate resources. When an identity tries to access any resource, we verify that identity with strong authentication, and we ensure that access is compliant and follows the access patterns typical for that identity. We also confirm that the identity follows least-privilege access principles.<\/p>\n
With these processes in place, verified identity contributes to the broader framework for Zero Trust, alongside the other pillars of verified devices, verified access, and verified services.<\/p>\n
<\/p>\n