Zero Trust assessment and progress tracking resources
Članak
Zero Trust is a security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request came from or what resource it accessed, the Zero Trust model teaches us to "never trust, always verify."
As an IT architect or implementer, you can use the assessment and progress tracking resources in this article to get the following results:
Assess your infrastructure's readiness for Zero Trust, including discovering which elements are already in place or can be easily strengthened or improved.
Track the progress of the necessary Zero Trust security improvements in your environment for both business leaders and IT departments.
Progress tracking resources for the adoption framework business scenarios
The Zero Trust adoption framework documentation set helps security and technology teams collaborate with business leaders on Zero Trust by providing the following results:
Recommended Zero Trust objectives for business leaders across organizations.
A methodical and phased approach to implementing a Zero Trust architecture.
A systematic way to track progress on objectives, scoped to business leaders.
A systematic way to track progress on objectives and their tasks, scoped to IT leads and implementers.
Curation of the most relevant resources for adoption of Zero Trust:
PowerPoint slides that are ready to present to business leaders.
Excel worksheets to assess your current status and to track progress.
Technical implementation guidance and user infographics.
Adoption guidance for Zero Trust recommends building a Zero Trust strategy and architecture through the following business scenarios:
Each business scenario starts with building the business case, and then describes how to advance the required technical work through each lifecycle phase (Define strategy, Plan, Ready, Adopt, and Govern and manage).
For each business scenario, you can use the following progress tracking resources.
At-a-glance blueprint for Zero Trust
Adoption Scenario Plan Phase Grid
Easily understand the security enhancements for each business scenario and the level of effort for the stages and objectives of the Plan phase.
For business scenario project leads, business leaders, and other stakeholders.
Use this module to learn about best practices that cybersecurity architects use and some key best practice frameworks for Microsoft cybersecurity capabilities. You also learn about the concept of Zero Trust, and how to get started with Zero Trust in your organization.
Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.