Microsoft’s Zero Trust journey

This post has been republished via RSS; it originally appeared at: Azure Active Directory Identity Blog articles.

Traditional perimeter-based network security has proved insufficient because it assumes that if a user is inside the corporate perimeter, they can be trusted. This is exactly where Zero Trust comes in. Zero Trust is a security strategy that upends the current broad trust model. Instead of assuming trustworthiness, it requires validation at every step of the process. This means that all touchpoints in a system—identities, devices, and services—are verified before they are considered trustworthy.


You can begin implementing a Zero Trust access model now but expect this to be a multi-year process. We are on this journey together and will continue to share insights and advice in the coming months and years.


To learn more, read Improve security with a Zero Trust access model.

Leave a Reply

Your email address will not be published. Required fields are marked *


This site uses Akismet to reduce spam. Learn how your comment data is processed.