Zero Trust for Endpoints and Applications - Essentials Series - Episode 3
Published Jun 10 2021 10:31 AM 8,197 Views
Bronze Contributor

See how you can apply Zero Trust principles and policies to your endpoints and apps; the conduits for users to access your data, network, and resources. Jeremy Chapman walks through your options, controls, and recent updates to implement the Zero Trust security model.

 

Screen Shot 2021-06-10 at 12.57.34 PM.png

 

Our Essentials episode gave a high-level overview of the principles of the Zero Trust security model, spanning identity, endpoints, applications, networks, infrastructure, and data. For Zero Trust, endpoints refer to the devices people use every day — both corporate or personally owned computers and mobile devices. The prevalence of remote work means devices can be connected from anywhere and the controls you apply should be correlated to the level of risk at those endpoints. For corporate managed endpoints that run within your firewall or your VPN, you will still want to use principles of Zero Trust: Verify explicitly, apply least privileged access, and assume breach.

 

 

QUICK LINKS:

Link References:

Unfamiliar with Microsoft Mechanics?

 

Keep getting this insider knowledge, join us on social:


Version history
Last update:
‎Jun 10 2021 10:33 AM
Updated by: