Microsoft's Zero Trust journey
Published Oct 29 2019 03:52 PM 5,048 Views

Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. This is exactly where Zero Trust comes in. Zero Trust is a security strategy that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system—identities, devices, and services—are verified before they are considered trustworthy.


You can begin implementing a Zero Trust access model now but expect this to be a multi-year process. We are on this journey together and will continue to share insights and advice in the coming months and years.


To learn more, read Improve security with a Zero Trust access model.

Version history
Last update:
‎Jul 24 2020 01:31 AM
Updated by: