New Blog Post | Build & monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel

%3CLINGO-SUB%20id%3D%22lingo-sub-3053696%22%20slang%3D%22en-US%22%3ENew%20Blog%20Post%20%7C%20Build%20%26amp%3B%20monitor%20Zero%20Trust%20(TIC%203.0)%20security%20architectures%20with%20Microsoft%20Sentinel%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-3053696%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22AshleyMartin_1-1641495109239.png%22%20style%3D%22width%3A%20647px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F337797iFB9A00187ADA9FC0%2Fimage-dimensions%2F647x309%3Fv%3Dv2%22%20width%3D%22647%22%20height%3D%22309%22%20role%3D%22button%22%20title%3D%22AshleyMartin_1-1641495109239.png%22%20alt%3D%22AshleyMartin_1-1641495109239.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fsecurity%2Fzero-trust%2Fintegrate%2Fsentinel-solution%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3EBuild%20and%20monitor%20Zero%20Trust%20(TIC%203.0)%20security%20architectures%20with%20Microsoft%20Sentinel%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FP%3E%0A%3CP%3EThe%20Microsoft%20Sentinel%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EZero%20Trust%20(TIC%203.0)%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Esolution%20enables%20governance%20and%20compliance%20teams%20to%20design%2C%20build%2C%20monitor%2C%20and%20respond%20to%20Zero%20Trust%20(TIC%203.0)%20requirements.%20The%20solution%20includes%20a%20workbook%2C%20analytics%20rules%2C%20and%20a%20playbook%2C%20which%20provide%20an%20automated%20visualization%20of%20Zero%20Trust%20principles%2C%20cross-walked%20to%20the%20Trust%20Internet%20Connections%20framework%2C%20helping%20organizations%20to%20monitor%20configurations%20over%20time.%3C%2FP%3E%0A%3CP%3EThis%20article%20describes%20how%20to%20install%20and%20use%20the%20Microsoft%20Sentinel%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3E%3CSTRONG%3EZero%20Trust%20(TIC%203.0)%3C%2FSTRONG%3E%3CSPAN%3E%26nbsp%3B%3C%2FSPAN%3Esolution%20in%20your%20Microsoft%20Sentinel%20workspace.%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-LABS%20id%3D%22lingo-labs-3053696%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3ECloud%20Security%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EMicrosoft%20Sentinel%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

AshleyMartin_1-1641495109239.png

Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel | Microsoft Do...

The Microsoft Sentinel Zero Trust (TIC 3.0) solution enables governance and compliance teams to design, build, monitor, and respond to Zero Trust (TIC 3.0) requirements. The solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.

This article describes how to install and use the Microsoft Sentinel Zero Trust (TIC 3.0) solution in your Microsoft Sentinel workspace.

0 Replies