
close
close
Upcoming FREE Conference on Identity Management and Privileged Access Management
As the way we work changes, organizations are looking for better remote access solutions. Virtual Private Networks (VPN) have been the mainstay of remote access for years, but they don’t live up to today’s requirements for scalable, resilient, and secure access. The zero-trust security model addresses the challenges of both ‘work from home’ and the need for stronger security.
Zero trust is a security framework. Its principle stems from the idea that you shouldn’t trust anyone. And that includes your own employees. Microsoft’s identity-centric zero trust model requires that every user accessing an application must be verified. Instead of assuming that everything behind the corporate firewall is safe, zero trust requires that all requests for access, regardless of where they come from, are verified as if they come from an untrusted network.
IT administrators are familiar with deploying and managing VPNs. But zero trust is a new concept for many. To help address the challenges of implementing zero trust, Microsoft recently unveiled a new information resource called the Zero Trust Deployment Center. The center aims to provide simple guidance using a series of objectives. And it provides actionable steps that organizations need to follow to implement zero trust.
Here is the list of steps you need to follow to reach zero trust maturity in your organization.
Azure Active Directory (Azure AD) and Microsoft Intune go a long way to helping implement the first 3 steps. To properly secure digital assets, IT policies should provide just enough access so that users can complete work-related tasks. Azure AD Conditional Access policies can limit access to corporate IT resources once users have verified access.
Azure AD Application Proxy acts as a proxy service for apps hosted on corporate intranets and it can completely replace VPN or reverse proxy remote access solutions. Azure AD is the cornerstone of zero trust, but Microsoft has other products that can help implement all the steps. And the Zero Trust Deployment Center is a good way to understand what needs to be achieved and how Microsoft’s different solutions fit into the zero trust story.
But there’s no one-fits-all solution because of different organizational requirements, technology implementations, and security strategies. To help companies understand where they are in the zero trust journey, Microsoft’s Zero Trust Assessment provides recommendations on how to move to the next stage of zero trust to improve security.
The Zero Trust Deployment Center offers a good framework for achieving maturity. But to reach the end of the road, you’ll need commitment to make sure that zero trust is applied to all digital assets. To succeed, security needs to be integrated as an end-to-end strategy right from the very beginning of each project rather than being left as an afterthought.
Regardless of how dedicated your organization is to achieving zero trust maturity, implementing any of the steps will improve security posture.
Check out Choosing between Virtual Private Network and Zero Trust Remote Access Solutions on Petri for more information on the zero trust model.
More in Remote Access
WireGuard VPN Gets Port to Windows Kernel but Don't Run Out to Replace IPsec or OpenVPN
Aug 31, 2021 | Russell Smith
Microsoft Tunnel Makes Connecting to Corporate Apps Easier from Android and iOS
Oct 26, 2020 | Russell Smith
Most popular on petri