اقرأ باللغة الإنجليزية

مشاركة عبر


What is Zero Trust?

Zero Trust is a security strategy. It isn't a product or a service, but an approach in designing and implementing the following set of security principles.

Principle Description
Verify explicitly Always authenticate and authorize based on all available data points.
Use least privilege access Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
Assume breach Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.

These principles are the core of Zero Trust. Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."

Zero Trust is designed to adapt to the complexities of the modern environment that embraces the mobile workforce. Zero Trust protects user accounts, devices, applications, and data wherever they're located.

A Zero Trust approach should extend throughout the entire organization and serve as an integrated security philosophy and end-to-end strategy.

Different organizational requirements, existing technology implementations, and security stages all affect how a Zero Trust security model implementation is planned and executed. Our guidance helps you assess your readiness for Zero Trust, and helps you build a plan to get to Zero Trust. Our guidance is based on our experience helping customers secure their organizations, and by implementing our own Zero Trust model for ourselves.

With Zero Trust, you move away from a trust-by-default perspective to a trust-by-exception one. An integrated capability to automatically manage those exceptions and alerts is important. You can more easily detect threats, respond to threats, and prevent or block undesired events across your organization.

Zero Trust and the US Executive Order 14028 on Cybersecurity

US executive order 14028, Improving the Nation's Cyber Security, directs federal agencies on advancing security measures that drastically reduce the risk of successful cyberattacks against the federal government's digital infrastructure. On January 26, 2022, the Office of Management and Budget (OMB) released the federal Zero Trust strategy in memorandum 22-09, in support of Executive Order 14028. Microsoft provides guidance to help organizations meet these requirements — Meet identity requirements of memorandum 22-09 with Microsoft Entra ID.

Zero Trust and Microsoft Secure Future Initiative (SFI)

Microsoft's Secure Future Initiative (SFI), launched in November of 2023, is a multiyear commitment that advances the way Microsoft designs, builds, tests, and operates our Microsoft technology to ensure that our solutions meet the highest possible standards for security. Microsoft’s Secure Future Initiative is, in large part, a rigid implementation of Zero Trust for our unique environment to improve our security posture.

For more information about SFI, see the Secure Future Initiative website.

Documentation set

Follow this table for the best Zero Trust documentation sets for your needs.

Documentation set Helps you... Roles
Adoption framework for phase and step guidance for key business solutions and outcomes Apply Zero Trust protections from the C-suite to the IT implementation. Security architects, IT teams, and project managers
Assessment and progress tracking resource Assess your infrastructure's readiness and track your progress. Security architects, IT teams, and project managers
Zero Trust partner kit Co-branded tracking resources, workshop, and architecture illustrations Partners and security architects
Deployment for technology pillars for conceptual information and deployment objectives Apply Zero Trust protections aligned with typical IT technology areas. IT teams and security staff
Zero Trust for small businesses Apply Zero Trust principles to small business customers. Customers and partners working with Microsoft 365 for business
Zero Trust for Microsoft Copilots for stepped and detailed design and deployment guidance Apply Zero Trust protections to Microsoft Copilots. IT teams and security staff
Zero Trust deployment plan with Microsoft 365 for stepped and detailed design and deployment guidance Apply Zero Trust protections to your Microsoft 365 organization. IT teams and security staff
Incident response with XDR and integrated SIEM Set XDR tools and integrate these with Microsoft Sentinel IT teams and security staff
Zero Trust for Azure services for stepped and detailed design and deployment guidance Apply Zero Trust protections to Azure workloads and services. IT teams and security staff
Partner integration with Zero Trust for design guidance for technology areas and specializations Apply Zero Trust protections to partner Microsoft cloud solutions. Partner developers, IT teams, and security staff
Develop using Zero Trust principles for application development design guidance and best practices Apply Zero Trust protections to your application. Application developers
US Government guidance for CISA, DoD, and the Memorandum for Zero Trust architecture Prescriptive recommendations for US Government requirements IT Architects and IT teams
Training Introduction to Zero Trust
Use this module to understand the Zero Trust approach and how it strengthens the security infrastructure within your organization.
Training Introduction to Zero Trust and best practice frameworks
Use this module to learn about best practices that cybersecurity architects use and some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in your organization.

Next steps

Learn about the Microsoft Zero Trust adoption framework.

Related links:

  • Zero Trust Overview: This video provides information about:

    • Zero Trust definition
    • Zero Trust principles
    • Zero Trust core concepts
  • Zero Trust - The Open Group: This video provides a perspective on Zero Trust from a standards organization.