Describe the Zero-Trust Model
Traditional Information Technology (IT) security measures have relied primarily on treating the corporate infrastructure as a boundary—everything inside the local network is safe, while anything outside the firewall is a threat.
However, the proliferation of mobile devices, hybrid work, and Bring-Your-Own-Device (BYOD) scenarios has allowed organizational data to be freely transported beyond the corporate network boundary. Firewalls in an office setting are not effective when the data you are trying to protect is on a tablet computer that was left at a restaurant or on the subway.
With that in mind, Microsoft (and the tech industry as a whole) has pivoted from the traditional security perimeter defense perspective to a model called zero trust.
Zero trust is based on the concept of minimizing an organization’s risk footprint by interrogating the security of everything that attempts to access data or services. The zero-trust model...