{"id":8921,"date":"2023-11-06T01:00:51","date_gmt":"2023-11-06T09:00:51","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8921"},"modified":"2023-11-07T11:23:37","modified_gmt":"2023-11-07T19:23:37","slug":"zero-trust-networking-sharing-lessons-for-leaders","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/zero-trust-networking-sharing-lessons-for-leaders\/","title":{"rendered":"Sharing Microsoft\u2019s Zero Trust networking lessons for leaders"},"content":{"rendered":"

\"MicrosoftToday we want to share the lessons we\u2019re learning from deploying Zero Trust networking across Microsoft.<\/p>\n

In many enterprises, network security has traditionally focused on strictly secured and monitored corporate network perimeters. Today, in a mobile-first and cloud-first world, business network traffic exists outside the corporate network as much as it does within. The rate and the sophistication level of security attacks are increasing. Organizations can no longer rely on the traditional model of simply protecting their remaining internal environments behind a firewall. Adopting a Zero Trust strategy can help to ensure optimal security without compromising end users\u2019 experiences.<\/p>\n

Our team in Microsoft Digital (MSD) is deploying Zero Trust networking across the enterprise to support the Zero Trust model that our internal security team is implementing across Microsoft.<\/p>\n

The Zero Trust model centers on strong identity, least-privilege access, device health verification, and service level control and telemetry across the entire IT infrastructure. The network perimeter is no longer the primary method of defense for an enterprise.<\/p>\n

At Microsoft\u2019s scale, with more than 600 sites in 120 countries and regions, evolving our network strategy to embrace Zero Trust networking has required alignment across the entire organization.<\/p>\n

\"The
The fundamental pillars of the Zero Trust model.<\/figcaption><\/figure>\n

[Gain insight from Microsoft\u2019s digital security team on Top 10 questions for Zero Trust.<\/a> |\u00a0Read more about sharing how Microsoft protects against ransomware.<\/a><\/em> | <\/em>Unpack the lessons learned in engineering Zero Trust networking.<\/a>]<\/em><\/p>\n

Sharing leadership lessons<\/h2>\n

Throughout our journey toward Zero Trust networking, we\u2019ve learned valuable lessons. We\u2019ve experienced challenges in the various stages of implementation that forced us to reassess and adjust our tactics and methods. We hope that by sharing our experiences we can help other enterprises better prepare to adopt and implement a Zero Trust networking strategy and overcome similar obstacles.<\/p>\n

To read more about the lessons that our engineers have learned from our Zero Trust networking deployment, visit Lessons learned in engineering Zero Trust networking<\/a>.<\/p>\n

Planning and design<\/h3>\n

Plan using a broad scope<\/h4>\n

The impact of implementing Zero Trust networking is significant because of its size and scope. At Microsoft, early and big-picture planning involved all relevant stakeholders, including network teams, security teams, user experience teams, team managers, infrastructure service providers, and compliance auditors. We started with a comprehensive plan and worked toward more specific plans and goals.<\/p>\n

Establish goals<\/h4>\n

We established several primary goals that we used as targets for the implementation process. While each of these considerations involved a finite subset of goals and discrete features that informed the specifics of Zero Trust networking implementation, they also served as high-level signposts to provide the direction that best supported our business. Our primary goals included:<\/p>\n