{"id":8921,"date":"2023-11-06T01:00:51","date_gmt":"2023-11-06T09:00:51","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8921"},"modified":"2023-11-07T11:23:37","modified_gmt":"2023-11-07T19:23:37","slug":"zero-trust-networking-sharing-lessons-for-leaders","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/zero-trust-networking-sharing-lessons-for-leaders\/","title":{"rendered":"Sharing Microsoft\u2019s Zero Trust networking lessons for leaders"},"content":{"rendered":"
Today we want to share the lessons we\u2019re learning from deploying Zero Trust networking across Microsoft.<\/p>\n
In many enterprises, network security has traditionally focused on strictly secured and monitored corporate network perimeters. Today, in a mobile-first and cloud-first world, business network traffic exists outside the corporate network as much as it does within. The rate and the sophistication level of security attacks are increasing. Organizations can no longer rely on the traditional model of simply protecting their remaining internal environments behind a firewall. Adopting a Zero Trust strategy can help to ensure optimal security without compromising end users\u2019 experiences.<\/p>\n
Our team in Microsoft Digital (MSD) is deploying Zero Trust networking across the enterprise to support the Zero Trust model that our internal security team is implementing across Microsoft.<\/p>\n
The Zero Trust model centers on strong identity, least-privilege access, device health verification, and service level control and telemetry across the entire IT infrastructure. The network perimeter is no longer the primary method of defense for an enterprise.<\/p>\n
At Microsoft\u2019s scale, with more than 600 sites in 120 countries and regions, evolving our network strategy to embrace Zero Trust networking has required alignment across the entire organization.<\/p>\n