Using and implementing the principles of the zero-trust methodology
In the previous section, we mentioned that the responsibility of securing the physical infrastructure for cloud services is provided by the cloud provider, Microsoft. Since Microsoft is responsible for the first layer of defense in our defense-in-depth security posture, the first layer that we are responsible for as a company is the identity and access layer. Therefore, the statements of identity is the new perimeter and identity is the new control plane have become extremely important in securing a cloud infrastructure. In Chapter 5, Defining Identity Principles/Concepts and the Identity Services within Azure AD, we will discuss the role of identity and access management within a cloud and hybrid infrastructure and the services that Microsoft provides to protect resources at this layer. It is important to understand the core concept that a company should adhere to when securing identity and access. This concept is...