{"id":16719,"date":"2019-10-29T09:00:31","date_gmt":"2019-10-29T17:00:31","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/29\/news-10458\/"},"modified":"2019-10-29T09:00:31","modified_gmt":"2019-10-29T17:00:31","slug":"news-10458","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/29\/news-10458\/","title":{"rendered":"Improve security with a Zero Trust access model"},"content":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 29 Oct 2019 16:00:48 +0000<\/strong><\/p>\n<p>Zero Trust is a security model that I believe can begin to turn the tide in the cybersecurity battles. Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. We\u2019ve learned that this isn&#8217;t true. Bad actors use methods like password spray and phishing to take advantage of a workforce that must remember too many usernames and passwords. Once behind the corporate firewall, a malicious user can often move freely, gaining higher privileges and access to sensitive data. We simply can\u2019t trust users based on a network as the control plane.<\/p>\n<p>The good news is that there is a solution. <a href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/implementing-a-zero-trust-security-model-at-microsoft\" target=\"_blank\" rel=\"noopener\">Zero Trust is a security strategy<\/a> that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system\u2014identities, devices, and services\u2014are verified before they are considered trustworthy. It also means that user access is limited to only the data, systems, and applications required for their role. By moving from a model that assumes trust to one that requires verification, we can reduce the number and severity of security breaches.<\/p>\n<p>You can begin implementing a Zero Trust access model now. Expect this to be a multi-year process, but with every action, you\u2019ll make incremental progress that improves your security posture. Start with implementing Multi-Factor Authentication (MFA) to better protect your identities and then develop a phased plan to address identity access, device access, and network access. This is the approach that Microsoft has taken.<\/p>\n<p>Take a look at our <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE3w93r\" target=\"_blank\" rel=\"noopener\">Zero Trust access model implementation plan<\/a> for more ideas on how to structure each phase. You can also look at my advice on <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/07\/11\/preparing-your-enterprise-to-eliminate-passwords\/\" target=\"_blank\" rel=\"noopener\">preparing your organization for passwordless<\/a> for tips on better securing your identities.<\/p>\n<p>We are on this journey together. I will continue to share insights and advice in the coming months and years.<\/p>\n<ul>\n<li>Read more about how <a href=\"https:\/\/www.microsoft.com\/en-us\/itshowcase\/implementing-a-zero-trust-security-model-at-microsoft\" target=\"_blank\" rel=\"noopener\">Microsoft is approaching Zero Trust<\/a>.<\/li>\n<li>Download the <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RE3w93r\" target=\"_blank\" rel=\"noopener\">Microsoft Zero Trust access architecture implementation plan<\/a>.<\/li>\n<li>Bookmark the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener\">Security blog<\/a> to keep up with our expert coverage on security matters. Also, follow us at <a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noopener\">@MSFTSecurity<\/a> for the latest news and updates on cybersecurity.<\/li>\n<\/ul>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/29\/improve-security-zero-trust-access-model\/\">Improve security with a Zero Trust access model<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/29\/improve-security-zero-trust-access-model\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Todd VanderArk| Date: Tue, 29 Oct 2019 16:00:48 +0000<\/strong><\/p>\n<p>Microsoft Corporate Vice President and CISO, Bret Arsenault, describes how Microsoft is approaching Zero Trust with advice for applying learnings to your organization.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2019\/10\/29\/improve-security-zero-trust-access-model\/\">Improve security with a Zero Trust access model<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Microsoft Security<a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[21983,22063],"class_list":["post-16719","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-ciso-series","tag-zero-trust"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16719"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16719\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16719"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}