Blog Post

Microsoft Entra Blog
1 MIN READ

Microsoft's Zero Trust journey

MicrosoftEntraTeam's avatar
Oct 29, 2019

Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. This is exactly where Zero Trust comes in. Zero Trust is a security strategy that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system—identities, devices, and services—are verified before they are considered trustworthy.

 

You can begin implementing a Zero Trust access model now but expect this to be a multi-year process. We are on this journey together and will continue to share insights and advice in the coming months and years.

 

To learn more, read Improve security with a Zero Trust access model.

Updated Jul 24, 2020
Version 7.0
No CommentsBe the first to comment