Summary

Completed

In this module, you learned that today’s organizations need a new security model that effectively:

  • adapts to the complexity of the modern environment.
  • embraces the mobile workforce.
  • protects people, devices, apps, and data regardless of location.

This module introduced you to Microsoft's Zero Trust security model, which supports this modern reality. This module began by showing how security isn’t getting any easier. Recent high-profile breach activities reveal the growing sophistication of today’s threat actors. These activities also show how complex it can be to manage business risk in an increasingly connected world. It’s a struggle for organizations of every size and for the public and private sector alike.

This module showed how Microsoft is a passionate proponent of the Zero Trust mindset, encompassing all types of threats—both outside in and inside out. Microsoft believes the right approach is to address security, compliance, identity, and device management as an interdependent whole. In doing so, it extends protection to all data, devices, identities, platforms, and clouds—whether those things are from Microsoft or not.

This module showed how Microsoft's Zero Trust model enables people to defend their communities and organizations in an ever-evolving threat landscape. You learned about the concepts and principles of the Zero Trust model and how Microsoft 365 supports it. This module covered the five steps to implementing a Zero Trust security model in your organization. It also examined Microsoft's story and strategy around Zero Trust networking.