Enabling Zero Trust with Azure network security services

%3CLINGO-SUB%20id%3D%22%5C%26quot%3Blingo-sub-3163524%5C%26quot%3B%22%20slang%3D%22%5C%26quot%3Ben-US%5C%26quot%3B%22%3EEnabling%20Zero%20Trust%20with%20Azure%20network%20security%20services%26lt%3B%5C%2Flingo-sub%26gt%3B%3CLINGO-BODY%20id%3D%22%5C%26quot%3Blingo-body-3163524%5C%26quot%3B%22%20slang%3D%22%5C%26quot%3Ben-US%5C%26quot%3B%22%3E%3CP%3E%3CEM%3EWritten%20by%3CSPAN%3E%26nbsp%3B%26lt%3B%5C%2FSPAN%26gt%3B%3CA%20title%3D%22%5C%26quot%3BAmir%22%20dahan%3D%22%22%20target%3D%22_blank%22%3EAmir%20Dahan%26lt%3B%5C%2FA%26gt%3B%2C%20Senior%20Program%20Manager%2C%20Azure%20Networking%26lt%3B%5C%2FEM%26gt%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FA%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%3E%3CEM%3EThis%20blog%20has%20been%20co-authored%20by%20Eliran%20Azulai%2C%20Principal%20Program%20Manager.%26lt%3B%5C%2FEM%26gt%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FEM%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%3EWith%20the%20accelerated%20pace%20of%20digital%20transformation%20since%20the%20COVID-19%20pandemic%20breakthrough%2C%20organizations%20continuously%20look%20to%20migrate%20their%20workloads%20to%20the%20cloud%20and%20to%20ensure%20their%20workloads%20are%20secure.%20Moreover%2C%20organizations%20need%20a%20new%20security%20model%20that%20more%20effectively%20adapts%20to%20the%20complexity%20of%20the%20modern%20environment%2C%20embraces%20the%20hybrid%20workplace%2C%20and%20protects%20applications%20and%20data%20regardless%20of%20where%20they%20are.%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%3E%26nbsp%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%3E%3CA%20title%3D%22%5C%26quot%3BZero%22%20trust%3D%22%22%20guidance%3D%22%22%20center%3D%22%22%20target%3D%22_blank%22%3EMicrosoft%E2%80%99s%20Zero%20Trust%20Framework%26lt%3B%5C%2FA%26gt%3B%3CSPAN%3E%26nbsp%3B%26lt%3B%5C%2FSPAN%26gt%3Bprotects%20assets%20anywhere%20by%20adhering%20to%20three%20principles%3A%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FSPAN%3E%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3COL%3E%5Cn%3CLI%3EVerify%20explicitly%3A%20Always%20authenticate%20and%20authorize%20based%20on%20all%20available%20data%20points%2C%20including%20user%20identity%2C%20location%2C%20device%20health%2C%20service%20or%20workload%2C%20data%20classification%2C%20and%20anomalies.%26lt%3B%5C%2FLI%26gt%3B%5Cn%3C%2FLI%3E%3CLI%3EUse%20least%20privileged%20access%3A%20Limit%20user%20access%20with%20just-in-time%20and%20just-enough-access%20(JIT%20and%20JEA)%2C%20risk-based%20adaptive%20policies%2C%20and%20data%20protection%20to%20help%20secure%20both%20data%20and%20productivity.%26lt%3B%5C%2FLI%26gt%3B%5Cn%3C%2FLI%3E%3CLI%3EAssume%20breach%3A%20Minimize%20blast%20radius%20and%20segment%20access.%20Verify%20end-to-end%20encryption%20and%20use%20analytics%20to%20get%20visibility%2C%20drive%20threat%20detection%2C%20and%20improve%20defenses.%26lt%3B%5C%2FLI%26gt%3B%5Cn%26lt%3B%5C%2FOL%26gt%3B%5Cn%3CP%3EIn%20this%20blog%2C%20we%20will%20describe%20some%20Azure%20network%20security%20services%20that%20help%20organizations%20to%20address%20Zero%20Trust%2C%20focusing%20on%20the%20third%20principle%E2%80%94assume%20breach.%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%3E%26nbsp%3B%26lt%3B%5C%2FP%26gt%3B%5Cn%3C%2FP%3E%3CP%20class%3D%22%5C%26quot%3B%5C%26quot%3B%22%3E%3CSTRONG%3E%3CA%20class%3D%22%5C%26quot%3Bbutton%5C%26quot%3B%22%20href%3D%22%5C%26quot%3Bhttps%3A%2F%2Fazure.microsoft.com%2Fen-us%2Fblog%2Fenabling-zero-trust-with-azure-network-security-services%2F%5C%26quot%3B%22%20target%3D%22%5C%26quot%3B_blank%5C%26quot%3B%22%20rel%3D%22%5C%26quot%3Bnoopener%20nofollow%20noopener%20noreferrer%22%20noreferrer%3D%22%22%3ERead%20the%20full%20article%26lt%3B%5C%2FA%26gt%3B%26lt%3B%5C%2FSTRONG%26gt%3B%26lt%3B%5C%2FP%26gt%3B%26lt%3B%5C%2Flingo-body%26gt%3B%3C%2FA%3E%3C%2FSTRONG%3E%3C%2FP%3E%3C%2FLI%3E%3C%2FOL%3E%3C%2FP%3E%3C%2FLINGO-BODY%3E%3C%2FLINGO-SUB%3E
Regular Contributor

Written by Amir Dahan, Senior Program Manager, Azure Networking

 

This blog has been co-authored by Eliran Azulai, Principal Program Manager.

 

With the accelerated pace of digital transformation since the COVID-19 pandemic breakthrough, organizations continuously look to migrate their workloads to the cloud and to ensure their workloads are secure. Moreover, organizations need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects applications and data regardless of where they are.

 

Microsoft’s Zero Trust Framework protects assets anywhere by adhering to three principles:

 

  1. Verify explicitly: Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies.
  2. Use least privileged access: Limit user access with just-in-time and just-enough-access (JIT and JEA), risk-based adaptive policies, and data protection to help secure both data and productivity.
  3. Assume breach: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.

In this blog, we will describe some Azure network security services that help organizations to address Zero Trust, focusing on the third principle—assume breach.

 

Read the full article

0 Replies