{"id":41839,"date":"2021-03-02T14:16:24","date_gmt":"2021-03-02T14:16:24","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=957347955120b0c077d0b837ead63ecd"},"modified":"2021-03-02T14:16:24","modified_gmt":"2021-03-02T14:16:24","slug":"microsoft-doubles-down-on-zero-trust-security-policies","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/microsoft-doubles-down-on-zero-trust-security-policies\/","title":{"rendered":"Microsoft doubles down on zero trust security policies"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet-0\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">2 Mar, 2021<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>Microsoft has launched new functionality across its Azure Active Directory (AD) authentication portal and Microsoft 365 to advance its\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/network-security\/358282\/what-is-zero-trust\">zero trust security strategy<\/a>\u00a0and protect its customers against insider threats.\u00a0<\/p>\n<p>\u2018Zero trust\u2019 is a security strategy based on the need for businesses to adapt to increasingly sophisticated threats, and is based on the assumption that nothing within the corporate network can be trusted.\u00a0<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nMicrosoft is among a\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/358063\/aws-ciso-urges-companies-to-adopt-zero-trust-security-approach\" >handful of tech companies<\/a>\u00a0to adopt these policies in a meaningful way over the past few years, with features revealed at its Ignite 2021 conference in Azure AD and Microsoft 365 bolstering the firm\u2019s zero trust capabilities.\u00a0<\/p>\n<p><a href=\"https:\/\/www.itpro.co.uk\/security\/cyber-security\/354468\/if-not-passwords-then-what\" >Passwordless authentication<\/a>\u00a0is now generally available in AD across all cloud and hybrid environments, with users able to use\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/29705\/what-are-biometrics\" >biometrics<\/a>, Windows Hello for Business, the Microsoft Authenticator app or FIDO2 security key to log-in.<\/p>\n<p>The policy engine Azure AD Conditional Access now uses authentication context to enforce more granular policies based on user interactions within an app, also taking into account the sensitivity of data they\u2019re trying to access.\u00a0<\/p>\n<p>Verifiable credentials, which lets organisations confirm pieces of information on their employees such as education or professional certificates, is also entering public preview within the next few weeks. This verifies claims made without collecting any personal data. The government of Flanders and the NHS are already piloting this service.<\/p>\n<p>\u201cAs defenders ourselves, we are passionate proponents of a Zero Trust mindset, encompassing all types of threats &#8211; both outside in and inside out,\u201d said Microsoft\u2019s corporate VP for security, compliance and identity, Vasu Jakkal.<\/p>\n<p>\u201cWe believe the right approach is to address security, compliance, identity, and device management as an interdependent whole, and to extend protection to all data, devices, identities, platforms, and clouds \u2013 whether those things are from Microsoft, or not.\u201d<\/p>\n<p>Changes in Microsoft 365 are largely based on trying to\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/data-breaches\/357545\/insider-data-breaches-third-2021\" >eliminate the insider threat<\/a>, both malicious and unwitting, with the firm investing in creating inside-out protection by extending its capabilities to third parties.<\/p>\n<p>Improvements in compliance include co-authoring documents protected with Microsoft Information Protection, which allows multiple users to work simultaneously on documents while benefitting from the extensive protection for documents and emails across Microsoft 365 apps.<\/p>\n<p>Microsoft 365\u2019s Insider Risk Management Analytics will allow customers to identify potential insider risk activity within an organisation, which will then inform policy configurations. Tools include daily scans of tenant audit logs, including historical activities, with\u00a0<a href=\"https:\/\/www.itpro.co.uk\/strategy\/28071\/what-is-machine-learning\" >machine learning<\/a>\u00a0used to identify any risky activity.<\/p>\n<p>Azure Pureview, Microsoft\u2019s unified government platform for on-premises, multi-cloud and software as a service (Saas) data, can also be used to scan and classify data residing in AWS S3 buckets, SAP EEC, SAP S4\/HANA and Oracle Database.<\/p>\n<p>\u201cAdopting a Zero Trust strategy is a journey,\u201d Jakkal continued. \u201cEvery single step you take will make you more secure. In today\u2019s world, with disappearing corporate network perimeters, identity is your first line of defence.\u00a0<\/p>\n<p>\u201cWhile your Zero Trust journey will be unique, if you are wondering where to start, our recommendation is to start with a strong cloud identity foundation. The most fundamental steps like strong authentication, protecting user credentials, and protecting devices are the most essential.\u201d<\/p>\n<p>Microsoft is also launching what it calls an \u201cassume breach\u201d toolset, which comprises tools and features that can help customers adopt the assume breach mentality without being hampered by the complexity that it can often entail. This is a critical component of the overall zero trust umbrella.\u00a0<\/p>\n<p>Among the improvements,\u00a0<a href=\"https:\/\/www.itpro.co.uk\/desktop-software\/26635\/how-to-turn-on-windows-defender\" >Microsoft Defender<\/a>\u00a0for Endpoint and Defender for Office 365 customers can now probe threats directly from the Microsoft 365 Defender portal, which provides alerts and in-depth investigation pages. A Threat Analytics section also provides a set of reports from Microsoft security researchers that help customers understand, prevent and mitigate active threats. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        2 Mar, 2021    <\/p>\n<p>      Microsoft has launched new functionality across its Azure Active Directory (AD) authentication portal and Microsoft 365 to advance its\u00a0zero trust security strategy\u00a0and protect its customer&#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41839","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41839"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41839\/revisions"}],"predecessor-version":[{"id":41840,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41839\/revisions\/41840"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}