Microsoft Publishes Documents on Implementing Zero-Trust Networks

Microsoft this week described the launch of a so-called "Zero Trust Deployment Center," which essentially is a Web page landing point for accessing Microsoft documents on its zero-trust security approach.

Zero trust is a conceptual approach for networks, and Microsoft claims that its identity and security products will lend organizations a helping hand toward achieving that end. Microsoft's definition of zero trust involves adopting an assumed-breach stance for networks. As part of that assumption, "every access request is fully authenticated, authorized, and encrypted before granting access."

In addition, Microsoft's zero-trust concept involves implementing least-privileged access practices to block so-called "lateral movements" by attackers who may have gained a network foothold. Microsoft also insists that zero trust involves harvesting "signals" data to detect and respond to threats "in real time."

Such details can be found in Microsoft's definition of zero trust, which is published at its zero-trust marketing site.

A Microsoft white paper on zero trust, available for download from the marketing site, traced the zero-trust concept back to the Jericho Forum of 2004, a U.K.-based coalition that aimed to reshape the traditional perimeter-based security mindset adopted by organizations. The Jericho Forum's 11 "Commandments" (PDF) included ideas like "access to data should be controlled by security attributes of the data itself." It sounds similar to what Microsoft implemented with its Azure Active Directory Conditional Access service and data loss prevention solutions.

The Zero Trust Deployment Center points readers to Microsoft documents on implementing secure identity, secure endpoints, secure applications, secure data and secure networks, as well as achieving visibility. Along the way, various Microsoft solutions get described, too.

The Center offers a step-by-step way for organizations to implement zero trust, per Microsoft's announcement.

"The Zero Trust Deployment Center breaks down deployment guidance into plain-language objectives across each of the technology pillars, providing an actionable list of steps needed to implement Zero Trust principles in your environment," the announcement explained.

Microsoft also has a "Zero Trust assessment tool," which appears to be a survey instrument that requires completing a form to use. The Zero Trust assessment tool is there to "help measure your current maturity and identify possible next milestones and priorities along with technologies" regarding implementing zero trust, the announcement explained.

About the Author

Kurt Mackie is senior news producer for 1105 Media's Converge360 group.


  • Microsoft Warns IT Pros on Windows Netlogon Fix Coming Next Month

    Microsoft on Thursday issued a reminder to organizations to ensure that their systems are properly patched for a "Critical"-rated Windows Netlogon vulnerability before next month's "update Tuesday" patch distribution arrives.

  • Microsoft Nudging Skype for Business Users to Teams

    Microsoft on Thursday announced some perks and prods for Skype for Business unified communications users, with the aim of moving them to the Microsoft Teams collaboration service instead.

  • How To Improve Windows 10's Sound and Video Quality

    Windows 10 comes with built-in tools that can help users get the most out of their sound and video hardware.

  • Microsoft Offers More 'Solorigate' Advice Using Microsoft 365 Defender Tools

    Microsoft issued yet another article with advice on how to use its Microsoft 365 Defender suite of tools to protect against "Solorigate" advanced persistent threat types of attacks in a Thursday announcement.

comments powered by Disqus