Zero Trust illustrations for IT architects and implementers
Straipsnis
These posters and technical diagrams give you information about deployment and implementation steps to apply the principles of Zero Trust to Microsoft cloud services, including Microsoft 365 and Microsoft Azure.
Zero Trust is a security model that assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."
As an IT architect or implementer, you can use these resources for deployment steps, reference architectures, and logical architectures to more quickly apply Zero Trust principles to your existing environment for:
Zero Trust for Microsoft Copilot for Microsoft 365
Adopting Microsoft Copilot for Microsoft 365 or Copilot is a great incentive for your organization to invest in Zero Trust. This set of illustrations introduces new logical architecture components for Copilot. It also includes security and deployment recommendations for preparing your environment for Copilot. These recommendations align with Zero Trust recommendations and help you begin this journey, even if your licenses are Microsoft 365 E3.
Copilot combines the power of large language models (LLMs) with your data in the Microsoft Graph (calendar, emails, chats, documents, meetings, and more) and the Microsoft 365 apps to provide a powerful productivity tool.
This series of illustrations provides a view into new logical architecture components. It includes recommendations for preparing your environment for Copilot with security and information protection while assigning licenses.
Apply Zero Trust to Azure IaaS components poster
This poster provides a single-page, at-a-glance view of the components of Azure IaaS as reference and logical architectures. It also provides the steps to ensure that these components have the "never trust, always verify" principles of the Zero Trust model applied.
Diagrams for applying Zero Trust to Azure IaaS components
You can also download the technical diagrams used in the Zero Trust for Azure IaaS series of articles. These diagrams are an easier way to view the illustrations in the article or modify them for your own use.
These diagrams show the reference and logical architectures for applying Zero Trust to Azure Virtual WAN. These diagrams are an easier way to view the illustrations in the article or modify them for your own use.
These diagrams show the reference and logical architectures for applying Zero Trust to Azure Virtual Desktop. These diagrams are an easier way to view the illustrations in the article or modify them for your own use.
This illustration shows the set of Zero Trust identity and device access policies for three levels of protection: Starting point, Enterprise, and Specialized security.
Common attacks and how Microsoft capabilities for Zero Trust can protect your organization
Learn about the most common cyber attacks and how Microsoft capabilities for Zero Trust can help your organization at every stage of an attack. Also use a table to quickly link to Zero Trust documentation for common attacks based on technology pillars such as identities or data.
An overview of the three phases as layers of protection against ransomware attackers: PDF. Use this poster together with the What is ransomware? article.
An overview of how Microsoft's SecOps team does incident response to mitigate ongoing attacks: PDF
The Security Best Practices slide presentation: PDF|PowerPoint
The top 10 Azure Security best practices: PDF|PowerPoint
The phishing, password spray, app consent grant incident response playbook workflows: PDF|Visio
Next steps
Use the following Zero Trust content based on a documentation set or the roles in your organization.
Documentation set
Follow this table for the best Zero Trust documentation sets for your needs.
Documentation set
Helps you...
Roles
Adoption framework for phase and step guidance for key business solutions and outcomes
Apply Zero Trust protections from the C-suite to the IT implementation.
Security architects, IT teams, and project managers
Zero Trust is not a product or tool, but an essential security strategy that seeks to continuously verify every transaction, asserts least privilege access, and assumes that every transaction could be a possible attack. Through the modules in this learning path, you'll gain an understanding of Zero Trust and how it applies to identity, endpoints, applications, networks, infrastructure, and data.
Since Zero Trust doesn't assume that requests are trustworthy, establishing a means to attest to the trustworthiness of the request is critical to proving its point-in-time trustworthiness. This attestation requires the ability to gain visibility into the activities on and around the request.