Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. This is exactly where Zero Trust comes in. Zero Trust is a security strategy that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system—identities, devices, and services—are verified before they are considered trustworthy.
You can begin implementing a Zero Trust access model now but expect this to be a multi-year process. We are on this journey together and will continue to share insights and advice in the coming months and years.
To learn more, read Improve security with a Zero Trust access model.
Updated Jul 24, 2020
Version 7.0MicrosoftEntraTeam
Microsoft
Joined April 04, 2019
Microsoft Entra Blog
Stay informed on how to secure access for employees, customers, and non-human identities, from anywhere, to multicloud and on-premises resources, with comprehensive identity and network access solutions powered by AI.