{"id":24635,"date":"2024-06-05T16:01:06","date_gmt":"2024-06-06T00:01:06","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2024\/06\/05\/news-18365\/"},"modified":"2024-06-05T16:01:06","modified_gmt":"2024-06-06T00:01:06","slug":"news-18365","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2024\/06\/05\/news-18365\/","title":{"rendered":"The four stages of creating a trust fabric with identity and network security"},"content":{"rendered":"<p><strong>Credit to Author: Joy Chik| Date: Tue, 04 Jun 2024 16:00:00 +0000<\/strong><\/p>\n<div class=\"wp-block-msxcm-kicker-container\">\n<div class=\" wp-block-msxcm-kicker-block wp-block-msxcm-kicker--align-right\" data-bi-an=\"Kicker Right\">\n<p class=\"wp-block-msxcm-kicker__title small text-neutral-400 text-uppercase\"> \t\t\tHow implementing a trust fabric strengthens identity and network\t\t<\/p>\n<p> \t\t<a \t\t\tclass=\"wp-block-msxcm-kicker__cta btn btn-link p-0 text-decoration-none\" \t\t\thref=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/05\/08\/how-implementing-a-trust-fabric-strengthens-identity-and-network\/\" \t\t\t\t\t> \t\t\t<span>Read the blog<\/span> <span class=\"glyph-append glyph-append-xsmall wp-block-msxcm-kicker__glyph glyph-append-chevron-right\"><\/span> \t\t<\/a> \t<\/div>\n<\/p><\/div>\n<p>At Microsoft, we\u2019re continually evolving our solutions for protecting identities and access to meet the ever-changing security demands our customers face. In a recent post, we introduced the concept of the <strong>trust fabric<\/strong>. It\u2019s a real-time approach to securing access that is adaptive and comprehensive. In this blog post, we\u2019ll explore how any organization\u2014large or small\u2014can chart its own path toward establishing their own digital trust fabric. We\u2019ll share how customers can secure access for any trustworthy identity, signing in from anywhere, to any app or resource on-premises, and in any cloud. While every organization is at a different stage in their security journey, with different priorities, we\u2019ll break down the trust fabric journey into distinct maturity stages and provide guidance to help customers prioritize their own <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\/identity-access\">identity and network access<\/a> improvements.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-1024x246.webp\" alt=\"Graphic showing the four stages for creating a trust fabric. \" class=\"wp-image-134521 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-1024x246.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-300x72.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-768x184.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-1536x368.webp 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic.webp 1818w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/trust-fabric-stages-graphic-1024x246.webp\"><\/figure>\n<h2 class=\"wp-block-heading\" id=\"stage-1-establish-zero-trust-access-controls\">Stage 1: Establish Zero Trust access controls<\/h2>\n<blockquote class=\"wp-block-quote blockquote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cMicrosoft enabled secure access to data from any device and from any location. The Zero Trust model has been pivotal to achieve the desired configuration for users, and Conditional Access has helped enable it.\u201d <\/p>\n<p> <cite>\u2014<a href=\"https:\/\/customers.microsoft.com\/story\/1426601400199305353-standard-bank-banking-capital-markets-identity\" target=\"_blank\" rel=\"noreferrer noopener\">Arshaad Smile, Head of Cloud Security, Standard Bank of South Africa<\/a>&nbsp;<\/cite><\/p><\/blockquote>\n<p>This first stage is all about your core identity and access management solutions and practices. It\u2019s about securing identities, preventing external attacks, and verifying explicitly with strong authentication and authorization controls. Today, identity is the first line of defense and the most attacked surface area. In 2022, Microsoft tracked 1,287 password attacks every second. In 2023 we saw a dramatic increase, with an average of more than 4,000 password attacks per second.<sup>1<\/sup><\/p>\n<p>To prevent identity attacks, Microsoft recommends a <a href=\"https:\/\/www.microsoft.com\/security\/business\/zero-trust\">Zero Trust<\/a> security strategy, grounded in the following three principles\u2014verify explicitly, ensure least-privilege access, and assume breach. Most organizations start with identity as the foundational pillar of their Zero Trust strategies, establishing essential defenses and granular access policies.&nbsp;Those essential identity defenses include:<\/p>\n<ul>\n<li>Single sign-on for all applications to unify access policies and controls.<\/li>\n<li>Phishing-resistant multifactor authentication or passwordless authentication to verify every identity and access request.<\/li>\n<li>Granular Conditional Access policies to check user context and enforce appropriate controls before granting access.<\/li>\n<\/ul>\n<p>In fact, Conditional Access is the core component of an effective Zero Trust strategy. Serving as a unified Zero Trust access policy engine, it reasons over all available user context signals like device health or risk, and decides whether to grant access, require multifactor authentication, monitor or block access.<\/p>\n<p><strong>Recommended resources\u2014Stage 1<\/strong><\/p>\n<p>For organizations in this stage of their journey, we\u2019re detailing a few recommendations to make it easier to adopt and advance Zero Trust security fundamentals:<\/p>\n<ol>\n<li>Implement phishing-resistant <a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/authentication\/howto-mfa-getstarted\" target=\"_blank\" rel=\"noreferrer noopener\">multifactor authentication<\/a> for your organization to protect identities from compromise.<\/li>\n<li>Deploy the recommended <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/identity\/conditional-access\/plan-conditional-access\" target=\"_blank\" rel=\"noreferrer noopener\">Conditional Access policies<\/a>, customize Microsoft-managed policies, and add your own.&nbsp;Test in report-only mode. Mandate strong, phishing-resistant authentication for any scenario.<\/li>\n<li>Check your <a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/monitoring-health\/concept-identity-secure-score\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Entra recommendations<\/a> and <a href=\"https:\/\/learn.microsoft.com\/entra\/identity\/monitoring-health\/concept-identity-secure-score\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Secure Score<\/a> to measure your organization\u2019s identity security posture and plan your next steps.\u00a0<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\" id=\"stage-2-secure-access-for-your-hybrid-workforce\">Stage 2: Secure access for your hybrid workforce<\/h2>\n<p>Once your organization has established foundational defenses, the next priority is expanding Zero Trust strategy by securing access for your hybrid workforce. Flexible work models are now mainstream, and they pose new security challenges as boundaries between corporate networks and open internet are blurred. At the same time, many organizations increasingly have a mix of modern cloud applications and legacy on-premises resources, leading to inconsistent user experiences and security controls.<\/p>\n<p>The key concept for this stage is Zero Trust user access. It\u2019s about advanced protection that extends Zero Trust principles to any resource, while making it possible to securely access any application or service from anywhere. At the second stage of the trust fabric journey, organizations need to:&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n<ol>\n<li>Unify Conditional Access across identity, endpoint, and network, and extend it to on-premises apps and internet traffic so that every access point is equally protected.<\/li>\n<li>Enforce least-privilege access to any app or resource\u2014including AI\u2014so that only the right users can access the right resources at the right time.<\/li>\n<li>Minimize dependency on the legacy on-premises security tools like traditional VPNs, firewalls, or governance that don\u2019t scale to the demands of cloud-first environments and lack protections for sophisticated cyberattacks.<\/li>\n<\/ol>\n<p>A great outcome of those strategies is much improved user experience, as now any application can be made available from anywhere, with familiar, consistent sign-in experience.<\/p>\n<p><strong>Recommended resources\u2014Stage 2<\/strong><\/p>\n<p>Here are key recommendations to secure access for your employees:<\/p>\n<ol>\n<li>Converge <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/global-secure-access\/concept-universal-conditional-access\" target=\"_blank\" rel=\"noreferrer noopener\">identity and network access controls<\/a> and extend Zero Trust access controls to on-premises resources and the open internet.<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/id-governance\/what-are-lifecycle-workflows\" target=\"_blank\" rel=\"noreferrer noopener\">Automate lifecycle workflows<\/a> to simplify access reviews and ensure least privilege access.<\/li>\n<li>Replace <a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/global-secure-access\/overview-what-is-global-secure-access\" target=\"_blank\" rel=\"noreferrer noopener\">legacy solutions<\/a> such as basic Secure Web Gateway (SWG), Firewalls, and Legacy VPNs.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\" id=\"stage-3-secure-access-for-customers-and-partners\">Stage 3: Secure access for customers and partners<\/h2>\n<p>With Zero Trust user access in place, organizations need to also secure access for external users including customers, partners, business guests, and more. Modern customer identity and access management (CIAM) solutions can help create user-centric experiences that make it easier to securely engage with customers and collaborate with anyone outside organizational boundaries\u2014ultimately driving positive business outcomes.<\/p>\n<p>In this third stage of the journey towards an identity trust fabric, it\u2019s essential to:<\/p>\n<ol>\n<li>Protect external identities with granular Conditional Access policies, fraud protection, and identity verification to make sure security teams know who those external users are.<\/li>\n<li>Govern external identities and their access to ensure that they only access resources that they need, and don\u2019t keep access when it\u2019s no longer needed.<\/li>\n<li>Create user-centric, frictionless experiences to make it easier for external users to follow your security policies.<\/li>\n<li>Simplify developer experiences so that any new application has strong identity controls built-in from the start.<\/li>\n<\/ol>\n<p><strong>Recommended resources\u2014Stage 3<\/strong><\/p>\n<ol>\n<li>Learn how to <a href=\"https:\/\/aka.ms\/ExternalIDDocs\" target=\"_blank\" rel=\"noreferrer noopener\">extend your Zero Trust foundation<\/a> to external identities. Protect your customers and partners against identity compromise.<\/li>\n<li>Set up your <a href=\"https:\/\/aka.ms\/IDGovernanceGuests\" target=\"_blank\" rel=\"noreferrer noopener\">governance for external users.<\/a> Implement strong access governance including lifecycle workflows for partners, contractors, and other external users.<\/li>\n<li><a href=\"https:\/\/aka.ms\/TryExternalID\" target=\"_blank\" rel=\"noreferrer noopener\">Protect customer-facing apps<\/a>. Customize and control how customers sign up and sign in when using your applications.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\" id=\"stage-4-secure-access-to-resources-in-any-cloud\">Stage 4: Secure access to resources in any cloud<\/h2>\n<p>The journey towards an organization\u2019s trust fabric is not complete without securing access to resources in multicloud environments. Cloud-native services depend on their ability to access other digital workloads, which means billions of applications and services connect to each other every second. Already workload identities exceed human identities by 10 to 1 and the number of workload identities will only grow.<sup>2<\/sup> Plus, 50% of total identities are super identities, that have access to all permissions and all resources, and 70% of those super identities are workload identities.<sup>3<\/sup><\/p>\n<p>Managing access across clouds is complex, and challenges like fragmented role-based access control (RBAC) systems, limited scalability of on-premises Privileged Access Management (PAM) solutions, and compliance breaches are common. These issues are exacerbated by the growing adoption of cloud services from multiple providers. Organizations typically use seven to eight different products to address these challenges. But many still struggle to attain complete visibility into their cloud access.<\/p>\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1-1024x477.webp\" alt=\"Graphic that shows the progression of steps for how to discover, detect, enforce, and automate with Microsoft Entra. \" class=\"wp-image-134493 webp-format\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1-1024x477.webp 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1-300x140.webp 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1-768x357.webp 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1.webp 1027w\" data-orig-src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture2-1-1024x477.webp\"><\/figure>\n<p>We\u2019re envisioning the future for cloud access management as a unified platform that will deliver comprehensive visibility into permissions and risk for all identities\u2014human and workloads\u2014and will secure access to any resources in any cloud. In the meantime, we recommend the following key actions for in the fourth stage of their journey towards the trust fabric:<\/p>\n<p>Read our recent blog titled \u201c<a href=\"https:\/\/techcommunity.microsoft.com\/t5\/microsoft-entra-blog\/securing-access-to-any-resource-anywhere\/ba-p\/4120308\" target=\"_blank\" rel=\"noreferrer noopener\">Securing access to any resource, anywhere<\/a>\u201d to learn more about our vision for Cloud Access Management.<\/p>\n<p><strong>Recommended resources\u2014Stage 4<\/strong><\/p>\n<p>As we work towards making this vision a reality, customers today can get started on their stage four trust fabric journey by learning more about multicloud risk, getting visibility, and remediating over-provisioned permissions across clouds. Check out the following resources to learn more.<\/p>\n<ol>\n<li>Understand multicloud security risks from the <a href=\"https:\/\/cdn-dynmedia-1.microsoft.com\/is\/content\/microsoftcorp\/microsoft\/final\/en-us\/microsoft-brand\/documents\/2024-State-of-Multicloud-Security-Risk-Report.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">2024 State of Multicloud Security Risk Report<\/a>.<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/entra\/permissions-management\/onboard-enable-tenant\" target=\"_blank\" rel=\"noreferrer noopener\">Get visibility into cloud permissions<\/a> assigned to all identities and permissions assigned and used across multiple clouds and remediate risky permissions.<\/li>\n<li><a href=\"https:\/\/learn.microsoft.com\/en-us\/entra\/workload-id\/\" target=\"_blank\" rel=\"noreferrer noopener\">Protect workload-to-workload<\/a> interactions by securing workload identities and their access to cloud resources.<\/li>\n<\/ol>\n<h2 class=\"wp-block-heading\" id=\"accelerate-your-trust-fabric-with-generative-ai-capabilities-and-skills\">Accelerate your trust fabric with Generative AI capabilities and skills<\/h2>\n<p>To increase efficiency, speed, and scale, many organizations are looking to AI to help augment existing security workflows. <a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\">Microsoft Entra<\/a> and Microsoft Copilot for Security work together at machine speed, integrating with an admin\u2019s daily workflow to prioritize and automate, understand cyberthreats in real time, and process large volumes of data.<\/p>\n<p>Copilot skills and capabilities embedded in Microsoft Entra helps admins to:<\/p>\n<ul>\n<li>Discover high risk users, overprivileged access, and suspicious sign-ins.<\/li>\n<li>Investigate identity risks and help troubleshoot daily identity tasks.<\/li>\n<li>Get instant risk summaries, steps to remediate, and recommended guidance for each identity at risk.<\/li>\n<li>Create lifecycle workflows to streamline the process of provisioning user access and eliminating configuration gaps.<\/li>\n<\/ul>\n<p>Copilot is informed by large-scale data and threat intelligence, including the more than 78 trillion security signals processed by Microsoft each day, and coupled with large language models to deliver tailored insights and guide next steps. Learn more about how <a href=\"https:\/\/www.microsoft.com\/security\/business\/ai-machine-learning\/microsoft-copilot-security\">Microsoft Copilot for Security<\/a> can help support your trust fabric maturity journey.<\/p>\n<div class=\"wp-block-msxcm-cta-block\" data-moray data-bi-an=\"CTA Block\">\n<div class=\"card d-block mx-ng mx-md-0\">\n<div class=\"row no-gutters\">\n<div class=\"d-flex col-md\">\n<div class=\"card-body align-self-center p-4 p-md-5\">\n<h2>Microsoft Entra<\/h2>\n<div class=\"mb-3\">\n<p>Protect any identity and secure access to any resource with a family of multicloud identity and network access solutions.<\/p>\n<\/p><\/div>\n<div class=\"link-group\"> \t\t\t\t\t\t\t<a href=\"https:\/\/www.microsoft.com\/security\/business\/microsoft-entra\" class=\"btn btn-primary\" > \t\t\t\t\t\t\t\t<span>Explore products<\/span> \t\t\t\t\t\t\t\t<span class=\"glyph-append glyph-append-chevron-right glyph-append-xsmall\"><\/span> \t\t\t\t\t\t\t<\/a> \t\t\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"col-md-4\"> \t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"900\" height=\"600\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/2023ZeroTrustPlatformsWave.jpg\" class=\"card-img img-object-cover\" alt=\"Side view close-up of a man typing on his phone while standing behind a Microsoft Surface Studio.\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/2023ZeroTrustPlatformsWave.jpg 900w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/2023ZeroTrustPlatformsWave-300x200.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2023\/09\/2023ZeroTrustPlatformsWave-768x512.jpg 768w\" sizes=\"auto, (max-width: 900px) 100vw, 900px\" \/>\t\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<h2 class=\"wp-block-heading\" id=\"microsoft-is-here-to-help\">Microsoft is here to help<\/h2>\n<p>No matter where you are on your trust fabric journey, Microsoft can help you with the experience, resources, and expertise at every stage. The Microsoft Entra family of identity and network access solutions can help you create a trust fabric for securing access for any identity, from anywhere, to any app or resource across on-premises and clouds. The products listed below work together to prevent identity attacks, enforce least privilege access, unify access controls, and improve the experience for users, admins, and developers.<\/p>\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"515\" src=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4-1024x515.jpg\" alt=\"Graph showing the functions of Microsoft Entra and which product is key to each function. \" class=\"wp-image-134494\" srcset=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4-1024x515.jpg 1024w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4-300x151.jpg 300w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4-768x386.jpg 768w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4-1536x773.jpg 1536w, https:\/\/www.microsoft.com\/en-us\/security\/blog\/wp-content\/uploads\/2024\/05\/Picture4.jpg 1600w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<p>Learn more about securing access across identity, endpoint, and network to accelerate your organization\u2019s trust fabric implementation on our new <a href=\"https:\/\/www.microsoft.com\/security\/business\/solutions\/identity-access\">identity and network access<\/a> solution page.<\/p>\n<h2 class=\"wp-block-heading\" id=\"learn-more\">Learn more<\/h2>\n<p>To learn more about Microsoft Security solutions, visit our\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/business\" target=\"_blank\" rel=\"noreferrer noopener\">website.<\/a>\u00a0Bookmark the\u00a0<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security blog<\/a>\u00a0to keep up with our expert coverage on security matters. Also, follow us on LinkedIn (<a href=\"https:\/\/www.linkedin.com\/showcase\/microsoft-security\/\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft Security<\/a>) and X (<a href=\"https:\/\/twitter.com\/@MSFTSecurity\" target=\"_blank\" rel=\"noreferrer noopener\">@MSFTSecurity<\/a>)\u00a0for the latest news and updates on cybersecurity.<\/p>\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n<p><sup>1<\/sup><a href=\"https:\/\/www.microsoft.com\/security\/security-insider\/microsoft-digital-defense-report-2023?rtc=1\">Microsoft Digital Defense Report 2023<\/a>.<\/p>\n<p><sup>2<\/sup><a href=\"https:\/\/query.prod.cms.rt.microsoft.com\/cms\/api\/am\/binary\/RW10t5E\" target=\"_blank\" rel=\"noreferrer noopener\">How do cloud permission risks impact your organization?<\/a>, Microsoft.<\/p>\n<p><sup>3<\/sup><a href=\"https:\/\/aka.ms\/multicloudriskreport\" target=\"_blank\" rel=\"noreferrer noopener\">2024 State of Multicloud Security Risk Report<\/a>, Microsoft.<\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/04\/the-four-stages-of-creating-a-trust-fabric-with-identity-and-network-security\/\">The four stages of creating a trust fabric with identity and network security<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n<p><a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/04\/the-four-stages-of-creating-a-trust-fabric-with-identity-and-network-security\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Joy Chik| Date: Tue, 04 Jun 2024 16:00:00 +0000<\/strong><\/p>\n<p>The trust fabric journey has four stages of maturity for organizations working to evaluate, improve, and evolve their identity and network access security posture. <\/p>\n<p>The post <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2024\/06\/04\/the-four-stages-of-creating-a-trust-fabric-with-identity-and-network-security\/\">The four stages of creating a trust fabric with identity and network security<\/a> appeared first on <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/blog\">Microsoft Security Blog<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[],"class_list":["post-24635","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24635","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=24635"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/24635\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=24635"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=24635"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=24635"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}