Examine Microsoft's strategy for Zero Trust networking

Completed

The zero trust security model emphasizes the need to secure not just a defined network, but all the data that flows through an organization's systems. Such data is often referred to as 'big data,' given its vast and complex scale. Big data refers to extremely large data sets that are analyzed computationally to reveal patterns, trends, and associations, especially relating to human behavior and interactions. It's characterized by three main attributes: volume (the amount of data), velocity (the speed of data in and out), and variety (the range of data types and sources).

This concept is important in the context of the zero trust security model. Why? Because big data presents organizations with opportunities to derive new insights and gain a competitive edge. Industries are moving away from an era where organizations clearly defined networks in a specific location. The cloud, mobile devices, and other endpoints expand the boundaries and change the paradigm. In today's IT world, there isn't necessarily a contained or defined network to secure. Instead, there's a vast portfolio of devices and networks, all linked by the cloud.

Instead of believing everything behind the corporate firewall is safe, an end-to-end Zero Trust strategy assumes breaches are inevitable. That means you must verify each request as if it originates from an uncontrolled network. As such, identity management plays a crucial role in this new paradigm.

In the Zero Trust model, there are three key objectives when it comes to securing your networks:

  • Be ready to handle attacks before they happen.
  • Minimize the extent of the damage and how fast it spreads.
  • Increase the difficulty of compromising your cloud footprint.

To achieve these objectives, organizations must follow these Zero Trust principles:

  • Verify explicitly. Always authenticate and authorize based on all available data points, including:
    • user identity
    • location
    • device health
    • service or workload
    • data classification
    • anomalies
  • Use least-privileged access. Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection to protect both data and productivity.
  • Assume breach. Minimize blast radius for breaches and prevent lateral movement by segmenting access by network, user, devices, and application awareness. Verify all sessions are encrypted end to end. Use analytics to get visibility, drive threat detection, and improve defenses.

Building Zero Trust networks with Microsoft 365

The traditional perimeter-based network defense is obsolete. Perimeter-based networks operate on the assumption that organizations can trust all systems within a network. However, today’s increasingly mobile workforce, the migration towards public cloud services, and the adoption of Bring Your Own Device (BYOD) model make perimeter security controls irrelevant. Networks that fail to evolve from traditional defenses are vulnerable to breaches: an attacker can compromise a single endpoint within the trusted boundary and then quickly expand foothold across the entire network.

Diagram showing the Zero Trust network model comprised of an identity provider, device directory, access proxy, and policy evaluation service.

Zero Trust networks eliminate the concept of trust based on network location within a perimeter. Instead, Zero Trust architectures use device and user trust claims to gate access to organizational data and resources. A general Zero Trust network model typically comprises the following signals:

  • Identity provider. Keeps track of users and user-related information.
  • Device directory. Maintains a list of devices that have access to corporate resources, along with their corresponding device information (for example, type of device, integrity, and so on).
  • Policy evaluation service. Determines if a user or device conforms to the policies created by security admins.
  • Access proxy. Utilizes the prior signals to grant or deny access to an organizational resource.

Gating access to resources using dynamic trust decisions allows an enterprise to enable access to certain assets from any device while restricting access to high-value assets on enterprise-managed and compliant devices. In targeted and data breach attacks, attackers can compromise a single device within an organization. They then use the 'hopping' method to move laterally across the network using stolen credentials. A solution based on a Zero Trust network, configured with the right policies around user and device trust, can help prevent bad actors from using stolen network credentials to gain access to a network.

Zero Trust is the next evolution in network security. The state of cyberattacks drives organizations to take the 'assume breach' mindset, but this approach shouldn't be limiting. Zero Trust networks protect corporate data and resources while ensuring that organizations can build a modern workplace. They can do so using technologies that empower employees to be productive anytime, anywhere, any which way.

Network Zero Trust deployment objectives

Before most organizations start their Zero Trust journey, their network security includes:

  • Few network security perimeters and open, flat networks.
  • Minimal threat protection and static traffic filtering.
  • Unencrypted internal traffic.

When implementing an end-to-end Zero Trust framework for securing networks, Microsoft recommends that organizations focus first on these initial deployment objectives:

After an organization achieves these initial objectives, it should then focus on the following deployment objectives:

Zero Trust networking based on Microsoft Entra conditional access

Today, employees access their organization’s resources from anywhere using various devices and apps. Access control policies that focus only on who can access a resource isn't sufficient. To achieve balance between security and productivity, security administrators must also factor in how to access a resource.

Microsoft Entra ID conditional access is the foundational building block of how customers can implement a Zero Trust network approach. Conditional access and Microsoft Entra ID Protection make dynamic access control decisions based on user, device, location, and session risk for every resource request. They combine:

  • Attested runtime signals about the security state of a Windows device.
  • The trustworthiness of the user session and identity to arrive at the strongest possible security posture.

Conditional access provides a set of policies that organizations can configure to control the circumstances in which users can access corporate resources. Considerations for access include user role, group membership, device health and compliance, mobile applications, location, and sign-in risk. Organizations use these considerations to decide whether to allow access, deny access, or control access with other authentication challenges (for example, multifactor authentication), Terms of Use, or access restrictions.

Conditional Access in Microsoft Entra ID is a critical component for securing applications, data, and infrastructure. It allows organizations to create rules that define how and where users can access resources authenticated with Microsoft Entra ID. These rules can be based on various conditions such as sign-in risk, network location, device management status, and more. For example, organizations can require multifactor authentication (MFA) when users sign in from an untrusted location or an unmanaged device, block access from embargoed nations, or require extra controls for high-risk applications or data.

Microsoft Entra ID integrates with Conditional Access to calculate a risk score for a user or sign-in, which can include a compliant network check. It also provides a baseline set of Conditional Access policies to customers, which enforce MFA in high-risk scenarios and are turned on by default in report-only mode unless the customer opts out. This approach is based on Microsoft's experience with Security Defaults for Microsoft Entra free customers, which has shown up to an 80% reduction in compromises.

Once an organization's Conditional Access policies are in place, Microsoft Entra ID integrates with them in the following manner. First, it evaluates the context of each sign-in attempt. It then enforces appropriate policies based on the conditions specified by the organization. This process ensures that only authorized and compliant access attempts are successful.

Knowledge check

Choose the best response for the following question. Then select 'Check your answers.'

Check your knowledge

1.

As the Microsoft 365 Administrator for Lucerne Publishing, Inc., Holly Spencer wants to implement a Zero Trust network approach. Which of the following items can Holly use to control access to resources at Lucerne Publishing?