%3CLINGO-SUB%20id%3D%22lingo-sub-964513%22%20slang%3D%22en-US%22%3EMicrosoft's%20Zero%20Trust%20journey%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-964513%22%20slang%3D%22en-US%22%3E%3CP%3ETraditional%20perimeter-based%20network%20security%20has%20proved%20insufficient%20because%20it%20assumes%20that%20if%20a%20user%20is%20inside%20the%20corporate%20perimeter%2C%20they%20can%20be%20trusted.%20This%20is%20exactly%20where%20Zero%20Trust%20comes%20in.%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.microsoft.com%252Fen-us%252Fitshowcase%252Fimplementing-a-zero-trust-security-model-at-microsoft%26amp%3Bdata%3D02%257C01%257Cv-dabada%2540microsoft.com%257C86212c8c905b4cd7d51d08d75cab9011%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637079764256389592%26amp%3Bsdata%3DMePSyh0xulw5SiDAAUAtU2AIBJXzcy%252FvhDJj9EuGh2w%253D%26amp%3Breserved%3D0%22%20rel%3D%22nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EZero%20Trust%20is%20a%20security%20strategy%3C%2FA%3E%26nbsp%3Bthat%20upends%20the%20current%20broad%20trust%20model.%20Instead%20of%20assuming%20trustworthiness%2C%20it%20requires%20validation%20at%20every%20step%20of%20the%20process.%20This%20means%20that%20all%20touchpoints%20in%20a%20system%E2%80%94identities%2C%20devices%2C%20and%20services%E2%80%94are%20verified%20before%20they%20are%20considered%20trustworthy.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EYou%20can%20begin%20implementing%20a%20Zero%20Trust%20access%20model%20now%20but%20expect%20this%20to%20be%20a%20multi-year%20process.%20We%20are%20on%20this%20journey%20together%20and%20will%20continue%20to%20share%20insights%20and%20advice%20in%20the%20coming%20months%20and%20years.%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20learn%20more%2C%20read%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F10%2F29%2Fimprove-security-zero-trust-access-model%2F%22%20rel%3D%22noopener%20noreferrer%20noopener%20noreferrer%22%20target%3D%22_blank%22%3EImprove%20security%20with%20a%20Zero%20Trust%20access%20model%3C%2FA%3E.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-964513%22%20slang%3D%22en-US%22%3E%3CP%3ELearn%20how%20to%20improve%20security%20by%20using%20a%20Zero%20Trust%20access%20model.%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-964513%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
New Contributor

Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. This is exactly where Zero Trust comes in. Zero Trust is a security strategy that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system—identities, devices, and services—are verified before they are considered trustworthy.

 

You can begin implementing a Zero Trust access model now but expect this to be a multi-year process. We are on this journey together and will continue to share insights and advice in the coming months and years.

 

To learn more, read Improve security with a Zero Trust access model.