Original
Original
Original
Contents
Why Zero Trust? 3 Who this is for
IT and business leaders looking to secure
Zero Trust fundamentals their IT environments using a Zero
Identity 6 Trust framework. This guide presents a
comprehensive explanation of the Microsoft
Endpoints 11 Zero Trust framework, along with specific
steps to take in any or all of the six key areas
of organizational security strategy.
Network 15
Data 22
Applications 27
Infrastructure 32
To help you get there faster, Microsoft has developed a flexible Zero Trust framework to guide adoption.
It provides comprehensive guidance covering the six key risk areas addressed by Zero Trust:
Identity Data
Automate risk detection and Classify, label, and protect data across
remediation and secure access to cloud and on-premises environments
resources with strong authentication to help prevent inappropriate sharing
across the entire digital estate. and reduce insider risks.
Endpoints Applications
Defend the larger attack surface Maintain highly secure employee
created by the growing number and access to cloud and mobile apps, as
diversity of endpoints using a flexible, well as remote access to on-premises
integrated approach to management. enterprise apps.
Network Infrastructure
Reduce perimeter-based security Protect hybrid infrastructure,
vulnerabilities, including the need including on-premises IT and cloud
for VPNs, and improve scalability of environments, with more efficient
security solutions for environments and automated management.
where the cloud is increasingly the
center of IT services.
By adopting a Zero Trust framework in one or its current capabilities and the level of risk
all of these areas, you can effectively modernize represented by a given security area. This guide
your security technology and processes, and makes it easy for you to get a broad overview of
start to maximize protection in the face of Zero Trust, as well as detailed information and
modern threats. However, each organization actionable steps for your areas of focus.
will have different priorities depending on
Microsoft Zero Trust architecture 5
Identities Endpoints
Human Corporate
Non-human Personal
Policy Threat
optimization Zero Trust protection
Governance policy Continuous assessment
Compliance Threat intelligence
Evaluation
Security posture assessment Forensics
Productivity optimization Enforcement Response automation
Network
Public
Private
Identity
Cloud applications and the growth
of hybrid work have redefined
the security perimeter. Corporate
applications and data are also moving
from on-premises to hybrid and cloud
environments. Many organizations
rely on older identity and access
management, built for a world with a
clear line between what’s inside and
what’s outside the network.
• When you plan your SSO deployment with • You’ll need a working Microsoft Entra tenant
your apps in Microsoft Entra ID, consider with Microsoft Entra ID Premium or trial
these questions: license enabled. If needed, you can create
one with Conditional Access administrator
• What are the administrative roles required
privileges for free.
for managing the application?
• Does the certificate need to be renewed? • Create a non-administrator user with a
• Who needs to be notified of changes password you know and create a group that
related to the implementation of SSO? the non-administrator user is a member of in
• What licenses are needed to ensure Microsoft Entra ID.
effective management of the application?
• Fine-tune your Conditional Access policies,
• Are shared user accounts used to access
by asking questions about who should access
the application?
your resources, what resources they should
access, and under what conditions. Policies
can be designed to grant access, or to block
Enforce access controls with adaptive,
access. Be sure to ask specific questions about
risk-based policies
what your policy is trying to achieve.
Move beyond simple access/block decisions
and tailor decisions based on risk appetite— • Document the answers to questions for
such as allowing access, blocking, limiting each policy before building them out and
access, or requiring additional proofs like deploy them in phases in the production
multi-factor authentication. environment. First apply a policy to a small
set of users in a test environment and verify if
the policy behaves as expected.
Zero Trust fundamentals: Identity 9
• While rolling out legacy authentication • Data from Identity Protection can be
blocking protection, we recommend a exported to other tools for archive and
phased approach, rather than disabling it further investigation and correlation.
for all users all at once. Before you can block The Microsoft Graph-based APIs allow
legacy authentication in your directory, you organizations to collect this data for further
need to first understand if your users have processing, such as with their SIEM solution.
apps that use legacy authentication and how
• Enable Identity Protection to get started.
it affects your overall directory.
Bring in user session data from Microsoft
• The easiest way to block legacy Defender for Cloud Apps to enrich
authentication across your entire organization Microsoft Entra ID with possible risky user
is by configuring a Conditional Access behavior after they were authenticated.
policy that applies specifically to legacy
authentication clients and blocks access.
Enrich your Identity and Access • To see your score history, visit the
Management (IAM) solution with more data Microsoft 365 Defender portal and review
The more data you feed your IAM solution, the your overall Microsoft Secure Score. You
more you can improve your security posture with can review changes to your overall secure
granular access decisions and better visibility into score be clicking on View History. Choose
users accessing corporate resources. a specific date to see which controls were
enabled for that day and what points you
• Microsoft Entra ID, Microsoft Defender for earned for each one.
Cloud Apps, and Microsoft Defender for
Endpoint work together to provide enriched
signal processing for better decision making. Learn more about solutions for
• Configure Conditional Access in Microsoft Zero Trust identity
Defender for Endpoint, Microsoft Defender
for Identity, and Microsoft Defender for Multi-factor authentication
Cloud Apps.
Conditional Access
Passwordless authentication
Improve your identity security posture
Conditional Access administrator privileges
The identity secure score in Microsoft Entra ID
helps you assess your identity security posture Microsoft Defender for Cloud Apps
by analyzing how well your environment aligns
with Microsoft best-practice recommendations Microsoft Defender for On-Premises
for security. Identity Security
• The identity secure score is available in all Microsoft Defender for Endpoint
editions of Microsoft Entra ID. Organizations
Microsoft 365 Defender portal
can access their identity secure score from the
Azure portal > Microsoft Entra ID > Security
> Identity Secure Score.
Endpoints
The modern enterprise has an
incredible diversity of endpoints
accessing data, but not all these
endpoints are managed or even
owned by the organization, leading
to different device configurations and
software patch levels. This creates a
massive attack surface.
Essentials of Zero Trust • You can ensure device and app compliance to
for endpoints control data flow outside trusted mobile apps
and devices through mobile app management
Register devices with your identity provider
(MAM) and mobile device management
To monitor security and risk across multiple (MDM) policies and set up mobile device
endpoints used by any one person, you need management for all internal users.
visibility in all devices and access points that
may be accessing your resources.
Ensure compliance before granting access
• You can register devices with Microsoft Entra Once you have identity for all the endpoints
ID to provide visibility into which devices are accessing corporate resources—and before
accessing your network, as well as the ability access is granted—ensure that they meet the
to use device health and status information minimum security requirements set by your
in access decisions. organization.
• Device identities are a prerequisite for • Microsoft Endpoint Manager can help you
scenarios like device-based Conditional Access set compliance rules to ensure that devices
policies and Mobile Device Management with meet minimum-security requirements
Microsoft Endpoint Manager. before access is granted.
Enable access for unmanaged devices • Mobile Device Management with Intune helps
as needed you secure endpoints for external users or
Enabling your employees to access appropriate otherwise unmanaged devices.
resources from unmanaged devices can be
critical to maintaining productivity. However, it’s Enforce data loss prevention policies
still imperative to protect your data. on your devices
Once data access is granted, controlling what
• Microsoft Intune Mobile Application
the user can do with your data is critical. For
Management lets you publish, push, configure,
example, if a user accesses a document with
secure, monitor, and update mobile apps for
a corporate identity, mechanisms should be
your users, ensuring they have access to the
in place to prevent saving that document in
apps they need to do their work.
an unprotected location or sharing it with a
• To configure access for unmanaged devices, consumer communication or chat app.
Intune app protection encrypts “corporate”
• Intune app protection policies help protect
data before it is shared outside the app. You
data with or without enrolling devices in a
can validate this by attempting to open the
device management solution by restricting
“corporate” file outside of the managed app.
access to company resources and keep data
The file should be encrypted and unable to
within the purview of your IT department.
be opened outside the managed app.
• App protection policies can be configured for
Enroll devices in Mobile Device apps that run on devices that are enrolled in
Management for external users Microsoft Intune or enrolled in a third-party
Enrolling devices from external users (such as mobile device management (MDM) solution
contractors, vendors, partners, etc.) into your (these are typically corporate owned).
MDM solution is a great way to help protect • App protection policies can also be
your data and ensure users have the access they configured for apps that run on devices not
need to do their work. enrolled in any mobile device management
• Microsoft Endpoint Manager provides solution. (These devices are typically
endpoint provisioning, configuration, employee-owned devices that aren’t
automatic updates, device wipe, and other managed or enrolled through Intune or other
remote actions. MDM solutions).
Zero Trust fundamentals: Endpoints 14
Network
We are no longer in an era of clearly
defined network specific to a certain
location. Instead of a contained and
defined network to secure, there is a
vast portfolio of devices and networks,
all linked by the cloud. Securing this
portfolio is challenging for many
enterprises, who often have few
network security perimeters and a flat,
open network, along with minimal
threat protection and unencrypted
internal traffic.
Zero Trust fundamentals: Network 16
Adopting a Zero Trust security framework Preventing data breaches and other
is the key to overcoming these limitations. network security threats is about hardened
Instead of believing everything behind the network protection. Without proper security
corporate firewall is safe, an end-to-end protocols, your business is at high risk for
Zero Trust framework assumes breaches advanced attacks.
are inevitable. That means you must verify
Zero Trust is a framework that assumes a
each request as if it originates from an
complex network’s security is always at risk
uncontrolled network.
to external and internal threats. A Zero Trust
In the Zero Trust framework, there are three architecture assumes that every connection
key objectives when it comes to securing and endpoint is considered a threat. The
your network: framework protects against these threats,
whether external or internal.
• Be ready to handle attacks before
they happen.
Segment user and resource access • Multiple Virtual Networks with peering:
Segmenting access for each workload helps This pattern is an extension of the
prevent network-based breaches. previous pattern where you have multiple
virtual networks with potential peering
• Microsoft Azure offers many ways to connections. You might opt for this pattern
segment workloads to manage user and to group applications into separate virtual
resource access. Within Azure, you can networks or if you need presence in
isolate resources at the subscription level with multiple Azure regions.
Virtual networks (VNets), VNet peering rules,
Network Security Groups (NSGs), Application • Multiple Virtual Networks in a hub-and-
Security Groups (ASGs), and Azure Firewalls. spoke model: This pattern is a more
You can create an Azure Virtual Network advanced virtual network organization
to help your Azure resources communicate where you choose a virtual network
together securely. in a given region as the hub for all the
other virtual networks in that region. The
• Choose the right network segmentation connectivity between the hub virtual
approach for your organization. Common network and its spokes of other virtual
patterns include: networks is achieved by using Azure virtual
network peering. All traffic passes through
• Single Virtual Network: In this pattern, all
the hub virtual network, and it can act as a
the components of your workload or, in
gateway to other hubs in different regions.
some cases, your entire IT footprint is put
inside a single virtual network. This pattern
is possible if you’re operating solely in a
single region since a virtual network can’t
span multiple regions.
Zero Trust fundamentals: Network 19
When you create new infrastructure, you Security operations teams face challenges
need to ensure that you also establish rules in addressing the multitude of alerts that
for monitoring and raising alerts. This is key arise from the never-ending flow of threats.
for identifying when a resource is displaying Implementing a solution with automated
unexpected behavior. investigation and remediation (AIR) capabilities
can help your security operations team address
• Microsoft Defender for Identity enables threats more efficiently and effectively.
signal collection to identify, detect, and
investigate advanced threats, compromised • Microsoft Defender for Endpoint Advanced
identity, and malicious insider actions Threat Protection includes automated
directed at your organization. investigation and remediation capabilities,
which can significantly reduce alert volume,
• Microsoft Defender for Identity helps allowing security operations to focus on
eliminate on-premises vulnerabilities to more sophisticated threats and other high-
prevent attacks before they happen, helps value initiatives.
security operations teams use their time
effectively by understanding the greatest • The technology in automated investigation
threats, and prioritize information to focus uses various inspection algorithms and is
on actual threats, not false signals. based on processes that are used by security
analysts. AIR capabilities are designed to
examine alerts and take immediate action to
resolve breaches. AIR capabilities significantly
reduce alert volume, allowing security
operations to focus on more sophisticated
threats and other high-value initiatives.
Data
With more people working outside the
office and the growth in cloud apps
and analytics, organizations need new
tools for protecting data as it travels
beyond perimeters of control. Zero
Trust enables you to protect data at
rest and in flight even when it leaves
the endpoints, apps, infrastructure,
and network that make up your
organization’s own IT infrastructure.
Zero Trust fundamentals: Data 23
To ensure protection and restrict data Essentials of Zero Trust for data
access to authorized users, data should be
Define a classification taxonomy
inventoried, classified, labeled, and, where
appropriate, encrypted. This requires you Defining the right label taxonomy and
to know what data you have, protect it protection policies is the most critical step in any
from unauthorized access and loss, and data protection strategy, so start with creating a
continuously monitor sensitive information for labeling strategy that reflects your organization’s
policy violations and risky behavior. sensitivity requirements for information.
According to the 2021 Cost of a Data Breach • You can evaluate and then tag content in your
report, organizations that have not deployed organization in order to control where it goes,
a Zero Trust program faced data breach costs protect it no matter where it is and to ensure
averaging $5.04 million. Those that were Zero that it is preserved and deleted according
Trust “mature” saw those costs decrease by to your organization’s needs. You do this
$1.76 million. Even those firms in the “early through the application of sensitivity labels,
stage” of deployment had $660,000 less of a retention labels, and sensitive information
burden. In short, Zero Trust can mitigate the type classification.
impact of a breach. • Data classification will scan your sensitive
content and labeled content before you
create any policies. This is called zero change
management. This lets you see the impact
that all the retention and sensitivity labels are
having in your environment and empower
you to start assessing your protection and
governance policy needs.
Govern access decisions based on policy Enforce access and usage rights to data
Move beyond simple access/block decisions and shared outside company boundaries
tailor access decisions for your data based on To properly mitigate risk without negatively
risk appetite—such as allowing access, blocking, impacting productivity, you need to control and
limiting access, or requiring additional proofs secure email, documents, and sensitive data you
like multi-factor authentication. share outside your company.
• Control Access enforces controls to specific • Deployment guides will help you understand
apps or actions, secures remote access to how to each solution features complement
on-premises web apps, and restricts access each, best practices based on the CxE teams
to approved, modern authentication-capable experience with customer roadblocks,
client apps. considerations to take and research before
starting your deployment, and offer resources
• Microsoft Defender for Cloud Apps lets
links to additional readings and topics to gain
you apply Azure Information Protection
a deeper understanding and an appendix for
classification labels automatically, with or
additional information on licensing.
without protection, to files as a file policy
governance action. You can also investigate • App Discovery policies make it easier to
files by filtering for the applied classification keep track of the significant discovered
label within the Defender for Cloud Apps applications in your organization to help you
portal. Using classifications enables greater manage these applications efficiently. Create
visibility and control of your sensitive data in policies to receive alerts when detecting new
the cloud. apps that are identified as either risky, non-
compliant, trending, or high-volume.
Zero Trust fundamentals: Data 26
Applications
To get the full benefit of cloud apps
and services, organizations must
simultaneously simplify access
and maintain control. A Zero Trust
framework helps you do both.
With applications now consumed from the Enforce policy-based session controls
cloud and mobile devices, the application attack Stopping breaches and leaks in real time
surface has expanded considerably. Therefore, before employees intentionally or inadvertently
implementing Zero Trust for applications put data and organizations at risk is key to
requires modern threat detection capabilities mitigating risk after access is granted. It’s also
that cover applications across various devices critical for businesses to enable employees to
and locations, including the cloud. securely use their own devices.
• Microsoft Defender for Cloud Apps can • App Discovery policies make it easier to
help you discover which apps are being keep track of the significant discovered
used, explore the risk of these apps, applications in your organization to help you
configure policies to identify new risky apps manage these applications efficiently. Create
being used, and unsanction these apps to policies to receive alerts when detecting new
block them natively using your proxy or apps that are identified as either risky, non-
firewall appliance. compliant, trending, or high-volume.
• Integrating Defender for Cloud Apps with • Defender for Cloud Apps provides you with
Microsoft Defender for Endpoint gives the ability to investigate and monitor the
you the ability to use Cloud Discovery app permissions your users granted. You can
beyond your corporate network or secure use this information to identify a potentially
web gateways. With the combined user suspicious app and, if you determine that it is
and device information, you can identify risky, you can ban access to it.
risky users or devices, see what apps they
are using, and investigate further in the
Defender for Endpoint portal.
Zero Trust fundamentals: Applications 31
• With JIT, you can lock down the inbound Defender for Cloud Apps Best Practices
traffic to your VMs, reducing exposure to
attacks while providing easy access to connect
to VMs when needed. When you enable
just-in-time VM access, you can select the
Find out more about securing
ports on the VM where inbound traffic will be
Applications with Zero Trust
blocked. Defender for Cloud ensures “deny all
inbound traffic” rules exist for your selected
ports in the network security group (NSG)
and Azure Firewall rules. These rules restrict
access to your Azure VMs’ management ports
and defend them from attack.
32
Infrastructure
IT infrastructure includes a diverse
range of technologies, including
hardware, virtual machines, software,
microservices, networking, and more.
• Manage configurations.
• Multiple Virtual Networks with peering: • Defender for Endpoint uses a combination
This pattern is an extension of the of technology including endpoint behavioral
previous pattern where you have multiple sensors, cloud security analytics, and threat
virtual networks with potential peering intelligence.
connections. You might opt for this pattern
to group applications into separate virtual • Built-in threat and vulnerability management
networks or if you need presence in uses a risk-based approach to the discovery,
multiple Azure regions. prioritization, and remediation of endpoint
vulnerabilities and misconfigurations.
Zero Trust fundamentals: Infrastructure 35
Making Zero
Most importantly, Microsoft recognizes that
Zero Trust is a journey, not a destination.
Because it has implications for every aspect
with help from impact, low-effort areas first can lead to rapid
improvements and clarify which steps to take
Microsoft
next. You can build a larger strategy as you
go. The important thing is to get started.
©2023 Microsoft Corporation. All rights reserved. This document is provided “as-is.” Information and views
expressed in this document, including URL and other Internet website references, may change without notice. You
bear the risk of using it. This document does not provide you with any legal rights to any intellectual property in
any Microsoft product. You may copy and use this document for your internal, reference purposes.