Jan 10, 2022

Protecting your network and data with Zero Trust approach

Explore the Zero Trust strategy fundamentals, trends and best practices with Microsoft security architect Mark Simos and Forrester analyst Steve Turner.

My notes:

  1. Zero Trust foundations: Definition and scope 
    • A unified security policy across the board
    • Modernization of your security operations and SOC
    • ZT is pushing all of those security fundamentals into the limelight
  2. Network-centric versus Identity-centric Zero Trust
    • micro-segmentation
    • Identity posture
    • Identity governance
  3. Business enablement in hybrid work environment
    • Work with business stakeholders
    • Moving from VPN to Zero Trust Network Access (ZTNA)
    • Modernizing you security approach
    • Leverage Zero Trust strategy with cloud services for greater flexibility
  4. Risk areas and vulnerabilities
    •  ZT addresses compliance and regulatory workflows
    • Expectation need to be woven into business, leadership, conversations, and thinking
    • Fail-safe or fail-protected concept
  5. Emerging trends in Zero Trust
    • IAM may evolve with new technologies and capabilities, and easily replaced to deliver different types of policy enforcement

 

Links: