Zero Trust
- Jonathan Weekes
- Oct 31, 2018
- 2 min read
Updated: Nov 13, 2018

One of the biggest issues in moving to the cloud is how to ensure the security of your data. In the old days you would simply put up a firewall and assume everything behind it was secure, but this can’t work a Cloud environment. Microsoft’s Azure uses hardened servers, multiple layers of protection, and actively monitors all networks, but your data still needs to be accessible to anyone who needs it without allowing access to anyone else. So how do you pull off this complex issue?
To address this issue the concept called Zero Trust was developed over ten years ago, which relies on the four pillars of 1) verifying the identity of users, 2) validating every device, 3) limiting access and privilege, and 4) utilizing AI to analyze user behaviors and network connections. Microsoft and other companies have employed Zero Trust to ensure all their client’s data is secure and is one of the only proven effective ways to prevent breach attempts.
In Azure’s system, Zero Trust starts with utilizing Azure AD and Conditional Access, which changes authentication so instead of treating every login the same, you can change the requirements depending on factors like the application being accessed, the location of the request, or the risk level of the user. Conditional Access can also authenticate devices and ensure they are compliant with Intune or another MDM system, as well as authenticated by the Domain, so you can authenticate both the user and device. Azure AD also analyzes all logins with an AI system to detect behavioral anomalies, which could indicate an unauthorized attempt, logins from risky locations, as well as impossible locations such as two login attempts being attempted from locations too far apart to travel between.
Azure and Office365 limits access to data and privileged operations by only granting the access that has been requested, and not simply the access the user is authorized for. While this might result in additional authentication requests, it prevents additional actions being carried out without explicit approval from the user. So, if an Administrator logs in to check their email, they will have to log in again to the Office 365 Admin Portal.
Zero Trust has made your Azure and Office365 systems secure, but what about your on-premises systems? Conditional Access can be applied to them too, by using Windows ADFS and AD Connect to provide strong authentication, and by using Azure AD Connect Health to extend Azure monitoring and analytics to on-premises.
By using Zero Trust, the cloud has become safer then most on-premises systems, and Microsoft is improving the security of Azure and Office365 every day. Just don’t throw out that Firewall until everything is safely in the Cloud.
Originally posted at https://newsignature.com/articles/zero-trust-discovering-security-confidence-in-the-cloud/
Comentários