The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that all systems within a network can be trusted. However, today’s increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional defenses are vulnerable to breaches: an attacker can compromise a single endpoint within the trusted boundary and then quickly expand foothold across the entire network. In addition digital transformation will require the security approach change from placing trust in devices attached to corporate networks to an approach where trust is verified with identity and device health validation regardless of connectivity location. In this session, learn how we’re implementing a zero trust model at Microsoft for 150,000 users and 600,000 end points across 120 countries.
Hi @Dean Gross, While we did not cover it directly, it is in fact a big part of our strategy. Having migrated the majority of our Line of Business (LoB) applications already to Azure over the last few years, we don't have many in that bucket that requires us to leverage Azure App Proxy, but we do currently have roughly 65+/- LoB Apps that leverage App Proxy today. Our three pronged approach is to:
Modernize app to PaaS, SaaS, or other serverless technology accessible from the Internet
Remain IaaS, but make application accessible from the Internet
Leverage Azure App Proxy for legacy on-prem application.
Our current plan is to have the majority (if not all) our LoB apps in bucket one or two by Sept. 2020.