{"id":9344,"date":"2024-07-23T01:01:02","date_gmt":"2024-07-23T08:01:02","guid":{"rendered":"https:\/\/www.microsoft.com\/insidetrack\/blog\/?p=9344"},"modified":"2024-10-26T14:54:18","modified_gmt":"2024-10-26T21:54:18","slug":"implementing-a-zero-trust-security-model-at-microsoft","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/insidetrack\/blog\/implementing-a-zero-trust-security-model-at-microsoft\/","title":{"rendered":"Implementing a Zero Trust security model at Microsoft"},"content":{"rendered":"

\"MicrosoftAt Microsoft, our shift to a Zero Trust security model more than five years ago has helped us navigate many challenges.<\/p>\n

The increasing prevalence of cloud-based services, mobile computing, internet of things (IoT), and bring your own device (BYOD) in the workforce have changed the technology landscape for the modern enterprise. Security architectures that rely on network firewalls and virtual private networks (VPNs) to isolate and restrict access to corporate technology resources and services are no longer sufficient for a workforce that regularly requires access to applications and resources that exist beyond traditional corporate network boundaries. The shift to the internet as the network of choice and the continuously evolving threats led us to adopt a Zero Trust security model internally here at Microsoft. Though our journey began many years ago, we expect that it will continue to evolve for years to come.<\/p>\n

[Learn how we\u2019re transitioning to modern access architecture with Zero Trust<\/a>. Find out how to enable a remote workforce by embracing Zero Trust security<\/a>. Running on VPN: Learn how we\u2019re keeping our remote workforce connected<\/a>.]<\/em>
\n