The traditional firewall (VPN security model) assumed you could establish a strong perimeter and then trust that activities within that perimeter were “safe.” As we digitally transform our companies, we need to transform our security model to one which assumes breach. The model should explicitly verify activities and automatically enforce security controls using all available signal, and employ the principle of least privileged access. This model is commonly referred to as “Zero Trust.”
Today, we’re publishing a new whitepaper to help you understand the core principles of Zero Trust along with a maturity model. It breaks down requirements across the six foundational elements to help guide your digital transformation journey.
To learn more, read Traditional perimeter-based network defense is obsolete-transform to a Zero Trust model.
Download our whitepaper Microsoft Zero Trust maturity model today!
Updated Jul 24, 2020
Version 3.0MicrosoftEntraTeam
Microsoft
Joined April 04, 2019
Microsoft Entra Blog
Stay informed on how to secure access for employees, customers, and non-human identities, from anywhere, to multicloud and on-premises resources, with comprehensive identity and network access solutions powered by AI.