{"id":18304,"date":"2022-02-17T10:00:38","date_gmt":"2022-02-17T18:00:38","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/02\/17\/news-12037\/"},"modified":"2022-02-17T10:00:38","modified_gmt":"2022-02-17T18:00:38","slug":"news-12037","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/02\/17\/news-12037\/","title":{"rendered":"4 best practices to implement a comprehensive Zero Trust security approach"},"content":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 17 Feb 2022 17:00:00 +0000<\/strong><\/p>\n<p>Today\u2019s threat actors don\u2019t see barriers, they see opportunities. As the old firewalls protecting the corporate network become obsolete amid the rush to adopt a hybrid workspace, implementing <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust security<\/a> has become an imperative across all sectors, both public and private. During this time of unprecedented change, Microsoft Security is committed to helping you <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/be-fearless\">be fearless<\/a> in pursuing your vision for growth and success.<\/p>\n<p>Because an effective Zero Trust approach needs to operate holistically across your complex digital estate, Microsoft Security solutions function as a unified whole to protect your people, data, and business. We\u2019re uniquely positioned to simplify and strengthen security across your entire enterprise\u2014even integrating easily with your existing third-party products. In this blog, we\u2019ll look at four guidelines for implementing a comprehensive Zero Trust strategy that can help your organization continue to move forward confidently in these uncertain times.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1-1024x601.jpg\" alt=\"Identities and endpoints as their authentication and compliance requests are intercepted by the Zero Trust Policy for verification before being granted access to networks and the data, apps, and infrastructure they\u2019re composed of.\" class=\"wp-image-105138\" width=\"840\" height=\"493\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1-1024x601.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1-300x176.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1-768x451.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1-1536x901.jpg 1536w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-1.jpg 1619w\" sizes=\"auto, (max-width: 840px) 100vw, 840px\" \/><\/figure>\n<p><em>Figure 1. Microsoft Zero Trust architecture.<\/em><\/p>\n<h2 id=\"1-build-zero-trust-with-comprehensive-coverage\">1. Build Zero Trust with comprehensive coverage<\/h2>\n<p>Despite what the name implies, a Zero Trust approach empowers organizations to grant employees greater freedom across all data, apps, and infrastructure. In a recent Microsoft-commissioned study conducted by Forrester Consulting, <a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RWRIEi?culture=en-us&amp;country=US\" target=\"_blank\" rel=\"noreferrer noopener\">The Total Economic Impact<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> (TEI) of Zero Trust Solutions From Microsoft<\/a>, the principal architect at a logistics firm described how Microsoft\u2019s comprehensive Zero Trust implementation allowed them to create a bring your own device (BYOD) program for the company\u2019s seasonal frontline workers, leading to efficiency gains. \u201cBefore, our seasonal workers would have to be paired with our full-time employees when [performing field visits]. But now, they can go out on their own.\u201d<\/p>\n<p>The interviewees said that \u201cby implementing Zero Trust architecture, their organizations improved employee experience (EX) and increased productivity.\u201d They also noted, \u201cincreased device performance and stability by managing all of their endpoints with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-endpoint-manager\">Microsoft Endpoint Manager<\/a>.\u201d This had a bonus effect of reducing the number of agents installed on a user\u2019s device, thereby increasing device stability and performance. \u201cFor some organizations, this can reduce boot times from 30 minutes to less than a minute,\u201d the study states. Moreover, shifting to Zero Trust moved the burden of security away from users. Implementing <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\/single-sign-on\">single sign-on<\/a> (SSO), <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/identity-access-management\/mfa-multi-factor-authentication\">multifactor authentication<\/a> (MFA), leveraging <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/09\/15\/the-passwordless-future-is-here-for-your-microsoft-account\/\">passwordless authentication<\/a>, and eliminating VPN clients all further reduced friction and improved user productivity.<\/p>\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"664\" src=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2-1024x664.jpg\" alt=\"Zero trust solutions and their capabilities, including Microsoft Endpoint Manager, Azure Active Directory, and Microsoft Sentinel.\" class=\"wp-image-105141\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2-1024x664.jpg 1024w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2-300x195.jpg 300w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2-768x498.jpg 768w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2-200x130.jpg 200w, https:\/\/www.microsoft.com\/security\/blog\/uploads\/securityprod\/2022\/01\/BF-2.jpg 1102w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p><em>Figure 2. Microsoft Zero Trust solutions and capabilities.<\/em><\/p>\n<h2 id=\"2-strengthen-zero-trust-with-ai-and-integration\">2. Strengthen Zero Trust with AI and integration<\/h2>\n<p>The Forrester study also found that \u201cexisting solutions failed to provide the high-fidelity signals, comprehensive visibility, and end-to-end self-healing capabilities needed to defend against today&#8217;s sophisticated attackers and volume of cyberthreats.\u201d For the interviewed organizations, \u201cprior solutions could not provide telemetry of a threat&#8217;s effect on data, a user&#8217;s exact activity on the network, or a timeline for effective remediation.\u201d And because the organizations relied on security solutions from multiple vendors, \u201cconsolidating telemetry information for triage and analytical work was difficult and time-consuming.\u201d<\/p>\n<p><a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-sentinel\/#:~:text=Microsoft%20Sentinel%20is%20a%20cloud,data%20across%20an%20enterprise%E2%80%94fast.\">Microsoft Sentinel<\/a> solves the problem of vulnerable security silos by providing a single solution for alert detection, threat visibility, proactive hunting, and threat response. As a cloud-native security information and event management (SIEM) and security orchestration, automation, and response (SOAR) solution, Microsoft Sentinel uses AI to eliminate security infrastructure setup and maintenance by automatically scaling to meet user needs. Because Microsoft Sentinel is available out of the box with service-to-service connectors, it\u2019s easy to gain real-time integration with <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/microsoft-365-defender\">Microsoft 365 Defender<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/\">Microsoft Azure Active Directory<\/a> (Azure AD), <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/threat-protection\/identity-defender\">Microsoft Defender for Identity<\/a>, and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/cloud-apps-defender\">Microsoft Defender for Cloud Apps<\/a>.<\/p>\n<p>Any truly comprehensive Zero Trust implementation requires functionality across multiple platforms. Microsoft Sentinel also contains <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-sentinel-blog\/30-new-azure-sentinel-data-connectors\/ba-p\/2176315\" target=\"_blank\" rel=\"noreferrer noopener\">30 new out-of-the-box data connectors<\/a> for Cisco, Salesforce Service Cloud, Google Workspace, VMware ESXi, Thycotic, and many more. These data connectors include a parser that transforms the ingested data into Microsoft Sentinel <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/sentinel\/network-normalization-schema\" target=\"_blank\" rel=\"noreferrer noopener\">normalized format<\/a>, enabling better correlation for end-to-end outcomes across security monitoring, hunting, incident investigation, and response scenarios. Microsoft Sentinel automates routine tasks\u2014with a 90 percent reduction in alert fatigue\u2014so, your security team can focus on the most critical threats.<\/p>\n<p>For example, by adhering to the values of Zero Trust, the Microsoft security operations center (SOC) assumes that any device or user can be breached. That means we end up scrutinizing roughly 600 billion security events each month. But because we utilize Microsoft Sentinel and our other security tools that leverage machine learning, threat intelligence, and data science, we\u2019re able to <a href=\"https:\/\/www.microsoft.com\/insidetrack\/blog\/how-microsoft-narrows-the-threat-funnel-on-over-600-billion-monthly-security-events\/\">filter 600 billion monthly events down to around 10,000 alerts<\/a>. We also use <a href=\"https:\/\/www.youtube.com\/watch?v=j1rRq06sfII\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Endpoint Automated Investigation and Response (AIR)<\/a> capabilities to find and fix low-level malware instances and other nuisance alerts. Microsoft Defender for Endpoint AIR capabilities can also clean up a device, delete the service, erase the file, and tell us when the problem has been remediated. This reduces noise for our SOC and helps shrink those 10,000 monthly alerts down to a manageable 3,500 cases for investigation. Whittling those numbers down is what helps us\u2014and you\u2014zero in on real threats.<\/p>\n<h2 id=\"3-simplify-for-easier-compliance-and-identity-and-access-management-iam\">3. Simplify for easier compliance and identity and access management (IAM)<\/h2>\n<p>The five organizations in the Forrester study struggled to comply with regulatory requirements because \u201cthe complexity of their IT environments made it difficult to audit their environments or effectively implement governance policies.\u201d Sound familiar? Fortunately, Zero Trust requirements can sometimes exceed some compliance requirements; meaning, organizations sometimes find that they\u2019re better off than they had been previously.<\/p>\n<p>As a feature in the <a href=\"https:\/\/docs.microsoft.com\/en-us\/microsoft-365\/compliance\/microsoft-365-compliance-center?view=o365-worldwide\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft 365 compliance center<\/a>, <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/compliance\/compliance-management\">Microsoft Compliance Manager<\/a> solves this common problem with intuitive management and continuous assessments\u2014from taking inventory of data risks to implementing controls, staying current with regulations and certifications, and reporting to auditors. Compliance Manager\u2019s machine learning and analytics even help sort through relevant data to respond to your legal, regulatory, and internal obligations based on requirements from the <a href=\"https:\/\/www.iso.org\/home.html\" target=\"_blank\" rel=\"noreferrer noopener\">International Organization of Standardization<\/a> (ISO), <a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">National Institute of Standards and Technology<\/a> NIST), <a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">Cybersecurity and Infrastructure Security Agency<\/a> (CISA), and <a href=\"https:\/\/gdpr.eu\/\" target=\"_blank\" rel=\"noreferrer noopener\">General Data Protection Regulation<\/a> (GDPR). It automatically measures your progress toward completing necessary actions\u2014providing a compliance score around data protection and regulatory standards\u2014along with workflow capabilities and built-in control mapping to help carry out improvements.<\/p>\n<p>To make compliance even easier, the new <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-sentinel-blog\/announcing-the-microsoft-sentinel-zero-trust-tic3-0-solution\/ba-p\/3031685\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Sentinel: Zero Trust (TIC 3.0) Workbook<\/a> features a redesigned user interface, new control card layouts, dozens of new visualizations, and better-together integrations with <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/defender-for-cloud\/defender-for-cloud-introduction\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Defender for Cloud<\/a> to monitor compliance posture deviations across each TIC 3.0 control family. The new workbook also provides a mechanism for viewing log queries, Azure Resource Graph, metrics, and policies aligned to TIC 3.0 controls\u2014enabling governance and compliance teams to design, build, monitor, and respond to Zero Trust requirements across 25 plus Microsoft products.<\/p>\n<p>Microsoft also offers more than 300 pre-built risk assessment templates to help you comply with evolving regulations, as well as integrated workflows to help ensure the right people across security, HR, legal, and compliance can investigate as soon as a risk is identified. The director at a manufacturing firm explained that \u201c<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-secure-score\">Microsoft Secure Score<\/a> reduced the time it took us to be compliant with the California Consumer Privacy Act (CCPA) and GDPR. And Azure AD and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/compliance\/e5-compliance?activetab=pivot%3aoverviewtab\">Microsoft 365 E5<\/a> really enhance our security capabilities.\u201d Secure Score simplifies your security posture by providing centralized visibility across all your Microsoft 365 workloads. This helps identify potential improvements, as well as benchmark your organization\u2019s status over time. Embedded guidance enables you to evaluate each recommendation and determine which vectors of attack are a priority, and how they can be mitigated.<\/p>\n<p>Organizations in the Forrester study also stated that \u201cLegacy infrastructures made it difficult for IAM teams to meet organizational security requirements and the needs of their users.\u201d <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/active-directory\/integrate\/#overview\" target=\"_blank\" rel=\"noreferrer noopener\">Azure Active Directory integration<\/a> enabled these businesses to streamline sign-in and easily deploy applications companywide, as well as enable SSO and automate user provisioning. These efficiency gains allowed their IAM teams to focus on improving security by implementing additional Zero Trust policies. By adopting Azure AD, the IAM teams also reduced time spent managing IAM infrastructure, provisioning and de-provisioning users, managing vendors, and dealing with application downtime and remediation.<\/p>\n<h2 id=\"4-look-for-best-in-breed-protection\">4. Look for best-in-breed protection&nbsp;<\/h2>\n<p>When looking for a Zero Trust solution you can rely on, there\u2019s a confidence that comes from knowing your security provider has seen <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/01\/27\/microsoft-surpasses-10-billion-in-security-business-revenue-more-than-40-percent-year-over-year-growth\/\">more than 40 percent year-over-year growth<\/a> and more than USD10 billion in revenue. As Thomas Mueller-Lynch, Service Owner Lead for Digital Identity <a href=\"https:\/\/customers.microsoft.com\/en-us\/story\/1422734606465483530-siemens-manufacturing-security\" target=\"_blank\" rel=\"noreferrer noopener\">at Siemens<\/a> put it, &#8220;There aren\u2019t too many vendors on the planet that can create a solution capable of providing consolidated insights into large, complex environments like ours. That\u2019s why we chose Microsoft.&#8221;<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">Microsoft Security<\/a> is a <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-leaders-gartner-magic-quadrant\">leader in five Gartner Magic Quadrants<\/a> and <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/microsoft-security-forrester-wave-leader\">eight Forrester Wave<img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2122.png\" alt=\"\u2122\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> categories<\/a> and ranked the highest in the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/01\/microsoft-threat-protection-leads-real-world-detection-mitre-attck-evaluation\/\" target=\"_blank\" rel=\"noreferrer noopener\">MITRE Engenui<\/a><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/01\/microsoft-threat-protection-leads-real-world-detection-mitre-attck-evaluation\/\">t<\/a><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/05\/01\/microsoft-threat-protection-leads-real-world-detection-mitre-attck-evaluation\/\" target=\"_blank\" rel=\"noreferrer noopener\">y\u00ae ATT&amp;CK Evaluation<\/a>. Microsoft was also named a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/11\/18\/microsoft-named-a-leader-in-idc-marketscape-for-modern-endpoint-security-for-enterprise-and-small-and-midsize-businesses\/\">Leader in IDC MarketScape<\/a> for Modern Endpoint Security. By unifying security, compliance, and identity, we can help you improve productivity and protect your entire environment\u2014from Windows and macOS to Linux, iOS, Android, and Amazon Web Services (AWS). For built-in intelligence, easy integration, and simplified management that addresses all three Zero Trust pillars, Microsoft Security provides the comprehensive solution you need to move forward\u2014fearless.&nbsp;<\/p>\n<h2 id=\"learn-more\">Learn more<\/h2>\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/be-fearless\">Be fearless<\/a>\u2014evaluate your security posture today.<\/li>\n<li>Explore our <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/zero-trust\">Zero Trust<\/a> approach to comprehensive security.<\/li>\n<\/ul>\n<p>To learn more about Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\">visit our&nbsp;website<\/a>.&nbsp;Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/17\/4-best-practices-to-implement-a-comprehensive-zero-trust-security-approach\/\">4 best practices to implement a comprehensive Zero Trust security approach<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/17\/4-best-practices-to-implement-a-comprehensive-zero-trust-security-approach\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Emma Jones| Date: Thu, 17 Feb 2022 17:00:00 +0000<\/strong><\/p>\n<p>Learn how to create a comprehensive, integrated Zero Trust approach that enables simplified security and compliance across your enterprise. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\/2022\/02\/17\/4-best-practices-to-implement-a-comprehensive-zero-trust-security-approach\/\">4 best practices to implement a comprehensive Zero Trust security approach<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.microsoft.com\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[4500,22063],"class_list":["post-18304","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-cybersecurity","tag-zero-trust"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18304"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18304\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18304"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}