Home
%3CLINGO-SUB%20id%3D%22lingo-sub-938452%22%20slang%3D%22en-US%22%3EAssessing%20your%20Zero%20Trust%20readiness%20with%20the%20Microsoft%20Maturity%20Model%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-938452%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20traditional%20firewall%20(VPN%20security%20model)%20assumed%20you%20could%20establish%20a%20strong%20perimeter%20and%20then%20trust%20that%20activities%20within%20that%20perimeter%20were%20%E2%80%9Csafe.%E2%80%9D%20As%20we%20digitally%20transform%20our%20companies%2C%20we%20need%20to%20transform%20our%20security%20model%20to%20one%20which%20assumes%20breach.%20The%20model%20should%20explicitly%20verify%20activities%20and%20automatically%20enforce%20security%20controls%20using%20all%20available%20signal%2C%20and%20employ%20the%20principle%20of%20least%20privileged%20access.%20This%20model%20is%20commonly%20referred%20to%20as%20%E2%80%9CZero%20Trust.%E2%80%9D%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EToday%2C%20we%E2%80%99re%20publishing%20a%20new%20whitepaper%20to%20help%20you%20understand%20the%20core%20principles%20of%20Zero%20Trust%20along%20with%20a%20maturity%20model.%20It%20breaks%20down%20requirements%20across%20the%20six%20foundational%20elements%20to%20help%20guide%20your%20digital%20transformation%20journey.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20learn%20more%2C%20read%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F10%2F23%2Fperimeter-based-network-defense-transform-zero-trust-model%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3ETraditional%20perimeter-based%20network%20defense%20is%20obsolete-transform%20to%20a%20Zero%20Trust%20model.%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDownload%20our%20whitepaper%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FZero-Trust-Vision%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%3EMicrosoft%20Zero%20Trust%20maturity%20model%3C%2FA%3E%20today!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-938452%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EAs%20we%20digitally%20transform%20our%20companies%2C%20we%20need%20to%20transform%20our%20security%20model%20to%20one%20which%20assumes%20breach.%20%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-938452%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
New Contributor

The traditional firewall (VPN security model) assumed you could establish a strong perimeter and then trust that activities within that perimeter were “safe.” As we digitally transform our companies, we need to transform our security model to one which assumes breach. The model should explicitly verify activities and automatically enforce security controls using all available signal, and employ the principle of least privileged access. This model is commonly referred to as “Zero Trust.”

 

Today, we’re publishing a new whitepaper to help you understand the core principles of Zero Trust along with a maturity model. It breaks down requirements across the six foundational elements to help guide your digital transformation journey. 

 

To learn more, read Traditional perimeter-based network defense is obsolete-transform to a Zero Trust model.

 

Download our whitepaper Microsoft Zero Trust maturity model today!