Share via

How does Microsoft’s Zero Trust security model integrate with Entra ID, Conditional Access, and Defender for Cloud Apps to ensure both identity protection and continuous access evaluation, especially in hybrid or multi-cloud environments?

Brevin Kibet 20 Reputation points
2025-09-08T18:55:40.4833333+00:00

Given that our hospital runs a hybrid environment with both on-prem AD and Entra ID, and staff frequently access sensitive patient data via Teams, Epic, and other SaaS apps, how can Microsoft’s Zero Trust framework specifically Conditional Access policies, Entra ID Continuous Access Evaluation, and Defender for Cloud Apps be combined to both protect identities and enforce real-time risk-based access without disrupting critical care operations?

Microsoft Security | Microsoft Entra | Microsoft Entra ID

Answer accepted by question author

  1. Anonymous
    2025-09-10T04:05:47.08+00:00

    Hello Brevin Kibet,
    Thank you for your response with extra information.
    You wanted to know how Microsoft’s Zero Trust security model integrates with Entra ID, Conditional Access, and Defender for Cloud Apps to protect identities and enforce continuous access evaluation especially in hybrid healthcare environments like yours, where staff access sensitive patient data via Teams, Epic, and other SaaS apps from both managed and unmanaged devices.

    Based on your hospital’s setup and the tools you currently use (Entra ID Conditional Access and Intune, with Defender for Endpoint and Sentinel under evaluation), I will try to give you solution which aligns with Microsoft’s Zero Trust principles and includes authoritative documentation links for each component.
    Zero Trust Integration Strategy for Hybrid Healthcare;

    • Identity Protection with Entra ID + Conditional Access

    Microsoft Entra ID acts as the identity control plane and conditional Access policies enforce contextual access decisions based on: User risk (e.g., leaked credentials), Sign-in risk (e.g., unfamiliar location), Device compliance (via Intune), Network location (home vs hospital).

    For unmanaged devices (e.g., external staff), you can enforce browser-only access and block native clients using Conditional Access App Control.

    more at: https://learn.microsoft.com/en-us/entra/identity/conditional-access/plan-conditional-access

    https://learn.microsoft.com/en-us/entra/identity/conditional-access/overview

    • Continuous Access Evaluation (CAE)

    CAE allows real-time enforcement of access policies even mid-session. For example, if your risk level changes or you move to an untrusted network, access can be revoked instantly without waiting for token expiration. CAE works seamlessly with: Microsoft Teams, SharePoint, Exchange Online and Defender for Cloud Apps.

    more at: https://learn.microsoft.com/en-us/security/zero-trust/zero-trust-identity-device-access-policies-overview

    • Session Control with Defender for Cloud Apps (CASB)

    you can use Defender for Cloud Apps which enables: Real-time session monitoring, Policy enforcement for risky behavior, Blocking downloads or uploads from unmanaged devices and App discovery and shadow IT control

    You can apply Conditional Access App Control to enforce these policies for SaaS apps like Epic (via Application Proxy), Teams, and others.
    reference for better understanding: https://learn.microsoft.com/en-us/defender-cloud-apps/conditional-access-app-control-how-to-overview

    https://learn.microsoft.com/en-us/defender-cloud-apps/conditional-access-app-control-identity

    • Secure Access to On-Prem Apps (Epic)

    Since you use Application Proxy for Epic, integrate it with Conditional Access to enforce Zero Trust policies for on-prem apps. This replaces traditional VPN with modern, secure access.

    https://learn.microsoft.com/en-us/defender-cloud-apps/proxy-intro-aad

    You can follow this roadmap for implementing Microsoft’s Zero Trust security model in your hybrid healthcare environment:

    Segment your access policies for managed vs unmanaged devices.

    Enable CAE for supported apps to enforce real-time access decisions.

    you can deploy Defender for Cloud Apps for session control and app governance.

    Integrate Application Proxy with Conditional Access for Epic and other on-prem apps.

    Evaluate Defender for Endpoint and Sentinel to extend Zero Trust to endpoint and SIEM layers.

    Hope this helps to clarify your queries.

    If the answer is helpful, please click "Accept Answer" and kindly upvote it. This will help us and others in the community as well. 
    Regards,
    Monalisha

    1 person found this answer helpful.

1 additional answer

Sort by: Most helpful
  1. Brevin Kibet 20 Reputation points
    2025-09-09T10:06:56.67+00:00

    Hello Monalisha,

    • Staff devices: A mix of managed via Intune and some unmanaged devices, mostly for external/contract staff.
    • Application Proxy: Yes, we use Application Proxy for some on-prem apps like Epic / No, not yet implemented.
    • Network switching: Yes, users frequently switch between home networks and hospital networks.
    • Current tools in place: We currently use Entra ID Conditional Access policies and Intune. We’re evaluating Defender for Endpoint, and Sentinel is under consideration for SIEM.
    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.