Microsoft 365 and Azure Security Tools: Zero Trust Framework
Videos|by Kieran Hollingsworth|12 June 2024
In this episode of our Microsoft 365 and Azure security video series, our Microsoft experts cover off Microsoft’s Zero Trust Framework and what it looks like in action.
The Zero Trust Framework is based on three guiding principles. These are:
- Verify Explicitly
- Use Least Privileged Access
- Assume Breach.
These principles encourage organisations to verify each request as though it has originated from outside of their organisation. Give users just enough access to carry out their job and protect all assets as though they will be accessed by an attacker to minimise the radius in event of a breach.
Given the rapidly evolving cyber threats modern businesses are exposed to, adopting a Zero Trust model is an essential step in ensuring your business can limit the impact of an eventual attack.
Watch this episode in our series of Microsoft security tools and concepts to learn how best your organisation can adopt a Zero Trust model, and what is involved.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Kieran Hollingsworth
Related News
Understanding the mission critical assets layer of cyber security
Cyber threats don’t knock. They barge in. That’s why forming a multi-layered fortress is important – each layer a wall, gate, or watchtower designed to keep intruders at bay. At the very centre of this fortress lies your mission critical assets...
Control access with the perimeter security layer
In part two of our seven layers of security miniseries, our Cyber Security Specialist Scott Harrison shares tips and insights on how to make your organisation’s digital perimeter safe from threats. It’s all about ensuring only the right people get...
The human layer in cyber security: Create a human firewall
Cyber threats are everywhere. They’re more sophisticated. Hacking is even run as a business. So any organisation, no matter the size is vulnerable. And regulations are getting stricter. Grey Matter Talks Tech season three is here As it’s such a...
Last mile delivery: How HERE WeGo Pro transforms fleet navigation.
The last mile is where delivery gets complicated. HERE WeGo Pro gives fleets truck-specific routing, real-time traffic alerts, and offline maps, helping teams optimise routes and stay compliant. It’s more than navigation—it’s operational intelligence for successful deliveries.