Microsoft 365 and Azure Security Tools: Zero Trust Framework
Videos|by Kieran Hollingsworth|12 June 2024
In this episode of our Microsoft 365 and Azure security video series, our Microsoft experts cover off Microsoft’s Zero Trust Framework and what it looks like in action.
The Zero Trust Framework is based on three guiding principles. These are:
- Verify Explicitly
- Use Least Privileged Access
- Assume Breach.
These principles encourage organisations to verify each request as though it has originated from outside of their organisation. Give users just enough access to carry out their job and protect all assets as though they will be accessed by an attacker to minimise the radius in event of a breach.
Given the rapidly evolving cyber threats modern businesses are exposed to, adopting a Zero Trust model is an essential step in ensuring your business can limit the impact of an eventual attack.
Watch this episode in our series of Microsoft security tools and concepts to learn how best your organisation can adopt a Zero Trust model, and what is involved.
Contact Grey Matter
If you have any questions or want some extra information, complete the form below and one of the team will be in touch ASAP. If you have a specific use case, please let us know and we'll help you find the right solution faster.
By submitting this form you are agreeing to our Privacy Policy and Website Terms of Use.
Kieran Hollingsworth
Related News
Three powerful ways to integrate Azure Maps and why ISVs should care
The ISV Challenge ISVs face pressure to deliver smarter, faster, location-aware solutions. In logistics, mobility, retail, and field services, geospatial intelligence is now a competitive edge. But integrating mapping technology can be complex, costly, and hard to scale. That’s where...
Firewall first: Blocking ransomware before it hits
Why blocking ransomware is important The average recovery cost following a ransomware attack has soared to over £2 million, according to Sophos’ latest State of Ransomware Report. More than a third of victimised businesses take longer than a month to...
Endpoint security essentials: What every business should know
How can you enhance your endpoint security layer? In episode four of our Seven Layers of Security miniseries, we unpack the critical role the endpoint security layer plays in modern layered defence strategies. From laptops to mobile devices, endpoints are...
Network security: The silent defender
It’s not just firewalls – your network security layer does more than you think In episode three of our seven layers of security podcast miniseries, we dive deep into the network security layer; the silent defender that underpins your entire...