Assessing your Zero Trust readiness with the Microsoft Maturity Model

Published Oct 23 2019 01:30 PM 5,476 Views
Microsoft

The traditional firewall (VPN security model) assumed you could establish a strong perimeter and then trust that activities within that perimeter were “safe.” As we digitally transform our companies, we need to transform our security model to one which assumes breach. The model should explicitly verify activities and automatically enforce security controls using all available signal, and employ the principle of least privileged access. This model is commonly referred to as “Zero Trust.”

 

Today, we’re publishing a new whitepaper to help you understand the core principles of Zero Trust along with a maturity model. It breaks down requirements across the six foundational elements to help guide your digital transformation journey. 

 

To learn more, read Traditional perimeter-based network defense is obsolete-transform to a Zero Trust model.

 

Download our whitepaper Microsoft Zero Trust maturity model today!

%3CLINGO-SUB%20id%3D%22lingo-sub-938452%22%20slang%3D%22en-US%22%3EAssessing%20your%20Zero%20Trust%20readiness%20with%20the%20Microsoft%20Maturity%20Model%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-938452%22%20slang%3D%22en-US%22%3E%3CP%3EThe%20traditional%20firewall%20(VPN%20security%20model)%20assumed%20you%20could%20establish%20a%20strong%20perimeter%20and%20then%20trust%20that%20activities%20within%20that%20perimeter%20were%20%E2%80%9Csafe.%E2%80%9D%20As%20we%20digitally%20transform%20our%20companies%2C%20we%20need%20to%20transform%20our%20security%20model%20to%20one%20which%20assumes%20breach.%20The%20model%20should%20explicitly%20verify%20activities%20and%20automatically%20enforce%20security%20controls%20using%20all%20available%20signal%2C%20and%20employ%20the%20principle%20of%20least%20privileged%20access.%20This%20model%20is%20commonly%20referred%20to%20as%20%E2%80%9CZero%20Trust.%E2%80%9D%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EToday%2C%20we%E2%80%99re%20publishing%20a%20new%20whitepaper%20to%20help%20you%20understand%20the%20core%20principles%20of%20Zero%20Trust%20along%20with%20a%20maturity%20model.%20It%20breaks%20down%20requirements%20across%20the%20six%20foundational%20elements%20to%20help%20guide%20your%20digital%20transformation%20journey.%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3ETo%20learn%20more%2C%20read%20%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2019%2F10%2F23%2Fperimeter-based-network-defense-transform-zero-trust-model%2F%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3ETraditional%20perimeter-based%20network%20defense%20is%20obsolete-transform%20to%20a%20Zero%20Trust%20model.%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EDownload%20our%20whitepaper%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2FZero-Trust-Vision%22%20target%3D%22_self%22%20rel%3D%22noopener%20noreferrer%22%3EMicrosoft%20Zero%20Trust%20maturity%20model%3C%2FA%3E%20today!%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-938452%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%3EAs%20we%20digitally%20transform%20our%20companies%2C%20we%20need%20to%20transform%20our%20security%20model%20to%20one%20which%20assumes%20breach.%20%3C%2FSPAN%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-938452%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Version history
Last update:
‎Jul 24 2020 01:31 AM
Updated by: