New Blog Post | Adopting a Zero Trust approach throughout the lifecycle of data

%3CLINGO-SUB%20id%3D%22lingo-sub-2977361%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Adopting%20a%20Zero%20Trust%20approach%20throughout%20the%20lifecycle%20of%20data%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2977361%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22CLO20b_Ariane_commute_screen_003-900x360.jpg%22%20style%3D%22width%3A%20900px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F327750iA1634F5CEDCDE214%2Fimage-size%2Flarge%3Fv%3Dv2%26amp%3Bpx%3D999%22%20role%3D%22button%22%20title%3D%22CLO20b_Ariane_commute_screen_003-900x360.jpg%22%20alt%3D%22CLO20b_Ariane_commute_screen_003-900x360.jpg%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fblog%2F2021%2F11%2F17%2Fadopting-a-zero-trust-approach-throughout-the-lifecycle-of-data%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EAdopting%20a%20Zero%20Trust%20approach%20throughout%20the%20lifecycle%20of%20data%20-%20Microsoft%20Security%20Blog%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EInstead%20of%20believing%20everything%20behind%20the%20corporate%20firewall%20is%20safe%2C%20the%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CA%20href%3D%22https%3A%2F%2Fwww.microsoft.com%2Fen-us%2Fsecurity%2Fbusiness%2Fzero-trust%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EZero%20Trust%3C%2FA%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Emodel%20assumes%20breach%20and%20verifies%20each%20request%20as%20though%20it%20originates%20from%20an%20uncontrolled%20network.%20Regardless%20of%20where%20the%20request%20originates%20or%20what%20resource%20it%20accesses%2C%20Zero%20Trust%20teaches%20us%20to%20%E2%80%9Cnever%20trust%2C%20always%20verify.%E2%80%9D%3C%2FP%3E%0A%3CP%3EAt%20Microsoft%2C%20we%20consider%20Zero%20Trust%20an%20essential%20component%20of%20any%20organization%E2%80%99s%20security%20plan%20based%20on%20these%20three%20principles%3A%3C%2FP%3E%0A%3COL%3E%0A%3CLI%3E%3CSPAN%20class%3D%22inner-wrap%22%3E%3CSTRONG%3EVerify%20explicitly%3A%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EAlways%20authenticate%20and%20authorize%20based%20on%20all%20available%20data%20points%2C%20including%20user%20identity%2C%20location%2C%20device%20health%2C%20service%20or%20workload%2C%20data%20classification%2C%20and%20anomalies.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22inner-wrap%22%3E%3CSTRONG%3EUse%20least%20privileged%20access%3A%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3ELimit%20user%20access%20with%20just-in-time%20(JIT)%20and%20just-enough-access%20(JEA)%2C%20risk-based%20adaptive%20policies%2C%20and%20data%20protection%20to%20protect%20both%20data%20and%20productivity.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3CLI%3E%3CSPAN%20class%3D%22inner-wrap%22%3E%3CSTRONG%3EAssume%20breach%3A%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3EMinimize%20blast%20radius%20and%20segment%20access.%20Verify%20end-to-end%20encryption%20and%20use%20analytics%20to%20get%20visibility%2C%20drive%20threat%20detection%2C%20and%20improve%20defenses.%3C%2FSPAN%3E%3C%2FLI%3E%0A%3C%2FOL%3E%0A%3CP%20class%3D%22%22%3EIn%20this%20article%2C%20we%20will%20focus%20on%20the%20third%20principle%20(assume%20breach)%20and%20how%20encryption%20and%20data%20protection%20play%20a%20significant%20role%20in%20getting%20prepared%20for%20a%20potential%20breach%20in%20your%20data%20center.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-2977361%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20Active%20Directory%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EData%20Loss%20Prevention%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EPrivacy%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EThreat%20Protection%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

CLO20b_Ariane_commute_screen_003-900x360.jpg

Adopting a Zero Trust approach throughout the lifecycle of data - Microsoft Security Blog

Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originates from an uncontrolled network. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to “never trust, always verify.”

At Microsoft, we consider Zero Trust an essential component of any organization’s security plan based on these three principles:

  1. Verify explicitly: Always authenticate and authorize based on all available data points, including user identity, location, device health, service or workload, data classification, and anomalies.
  2. Use least privileged access: Limit user access with just-in-time (JIT) and just-enough-access (JEA), risk-based adaptive policies, and data protection to protect both data and productivity.
  3. Assume breach: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.

In this article, we will focus on the third principle (assume breach) and how encryption and data protection play a significant role in getting prepared for a potential breach in your data center.

0 Replies