{"id":8934,"date":"2023-11-07T09:00:41","date_gmt":"2023-11-07T17:00:41","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=8934"},"modified":"2023-11-07T12:52:57","modified_gmt":"2023-11-07T20:52:57","slug":"lessons-learned-in-engineering-zero-trust-networking","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/lessons-learned-in-engineering-zero-trust-networking\/","title":{"rendered":"Learning from engineering Zero Trust networking at Microsoft"},"content":{"rendered":"

\"MicrosoftOur Microsoft Digital (MSD) team is deploying Zero Trust networking internally at Microsoft as part of our Zero Trust initiative, our comprehensive approach to verification and identity management.<\/p>\n

Powered by Microsoft\u2019s internal security team, our Zero Trust model centers on strong identity, least-privilege access, device-health verification, and service-level control and telemetry across the entire IT infrastructure. Our networking leadership and engineering teams are building a network to support the Zero Trust model. It includes fully integrated authentication across all network devices, effective segmentation of our global network, end-to-end encrypted connectivity, and intelligent monitoring.<\/p>\n

\"Graphic
The primary functions of Zero Trust networking.<\/figcaption><\/figure>\n

Zero Trust networking is a journey; we\u2019ve come a long way, and we\u2019ve learned valuable lessons. In this article, we share these lessons with you to help you plan and deploy Zero Trust networking effectively and efficiently in your environment.<\/p>\n

[To read more about the leadership lessons from our Zero Trust networking deployment, visit Zero Trust networking: Sharing lessons for leaders<\/a>. | Check out Microsoft\u2019s digital security team answers your Top 10 questions on Zero Trust.<\/a> | Discover using a Zero Trust strategy to secure Microsoft\u2019s network during remote work.<\/a> | Read more about Running on VPN: How Microsoft is keeping its remote workforce connected.<\/a>]<\/em><\/em><\/p>\n

Primary goals<\/h2>\n

Our engineering goals for Zero Trust followed the general scope of the primary functions of Zero Trust, and they established how we approached the implementation of Zero Trust networking.<\/p>\n