{"id":1944,"date":"2023-08-31T02:14:00","date_gmt":"2023-08-31T02:14:00","guid":{"rendered":"https:\/\/thecloudmarathoner.com\/?p=1944"},"modified":"2023-09-15T02:22:03","modified_gmt":"2023-09-15T02:22:03","slug":"what-services-you-could-use-to-apply-zero-trust-%f0%9f%9a%b7-principles-in-your-cloud-environment-%e2%81%89-%f0%9f%a4%94","status":"publish","type":"post","link":"https:\/\/thecloudmarathoner.com\/index.php\/2023\/08\/31\/what-services-you-could-use-to-apply-zero-trust-%f0%9f%9a%b7-principles-in-your-cloud-environment-%e2%81%89-%f0%9f%a4%94\/","title":{"rendered":"What services you could use to apply Zero Trust \ud83d\udeb7 principles in your cloud environment \u2049 \ud83e\udd14"},"content":{"rendered":"\n<p>Hello Cloud Marathoners!<\/p>\n\n\n\n<p>We live in a rapidly evolving security landscape \ud83d\udd10 \ud83d\udee1 with new challenges every day. Even after the pandemic, our work continues to be blended with remote work where many organizations enabled the BYOD policies to increase productivity of the people.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Growing landscape of cybersecurity attacks<\/h4>\n\n\n\n<p>Relaxed controls on IT assets, welcomed potential vulnerabilities, and attack surfaces are also expanded adding layers of complexity to corporate IT to perform their task to defend and enable organizational services.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"534\" src=\"\/wp-content\/uploads\/2023\/09\/image-1-1024x534.png\" alt=\"\" class=\"wp-image-1945\" srcset=\"\/wp-content\/uploads\/2023\/09\/image-1-1024x534.png 1024w, \/wp-content\/uploads\/2023\/09\/image-1-300x156.png 300w, \/wp-content\/uploads\/2023\/09\/image-1-768x400.png 768w, \/wp-content\/uploads\/2023\/09\/image-1-1536x800.png 1536w, \/wp-content\/uploads\/2023\/09\/image-1-1200x625.png 1200w, \/wp-content\/uploads\/2023\/09\/image-1.png 2048w\" sizes=\"auto, (max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Zero Trust model aligned services<\/h4>\n\n\n\n<p>Zero Trust model offered by leading industry players like\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/microsoft\/\">Microsoft<\/a>\u00a0offers comprehensive solutions to our security challenges. Let&#8217;s consider those services and their benefits that are listed below:<\/p>\n\n\n\n<p>\u2705 Security Posture Management<br>It is enhanced with Azure Policy and Azure Blueprints by defining and enforcing compliance and control guardrails on Azure resources<\/p>\n\n\n\n<p>\u2705 Identities<br>Are strengthened using Entra ID (aka, Azure AD) providing robust authentication and authorization.<\/p>\n\n\n\n<p>\u2705 Endpoint Management<br>Services like Microsoft Intune and Entra ID Join manage the corporate and BYOD devices with strict compliance<\/p>\n\n\n\n<p>\u2705 Web App protection<br>Azure Defender for Cloud &amp; Azure Web Application Firewall (WAF) protects app services by using bleeding-edge security features<\/p>\n\n\n\n<p>\u2705 Data security<br>Remains top priority in transit and rest with advanced security features of Azure Storage services by providing encrypted, reliable, and scalable solutions<\/p>\n\n\n\n<p>\u2705 Infrastructure security<br>Secrets and certificates are protected with Azure Key Vault services and Microsoft Defender for Cloud offers comprehensive threat protection from day zero<\/p>\n\n\n\n<p>\u2705 Network Security<br>Azure network services like Azure Firewall and Virtual Networks are ensuring traffic is secure and segmented<\/p>\n\n\n\n<p>\u2705 Conditional Access &amp; Controls<br>App and data access is guarded by Microsoft Defender for Cloud Apps and Conditional Access services by enforcing specific access controls and providing visibility of your SaaS app landscape to help protect your apps.<\/p>\n\n\n\n<p>\u2705 Modern SIEM and SOAR solution<br>The Azure Sentinel stands as a cloud-native solution that combines capabilities by centralizing threat detection and response.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">In Summary<\/h4>\n\n\n\n<p>In summary,&nbsp;<a href=\"https:\/\/www.linkedin.com\/company\/msnazure\/\">Microsoft Azure<\/a>&nbsp;provides tools and services that are specifically designed to address growing concerns of vulnerabilities that your IT and Security team are tasked to deal with by following Zero Trust principles.<\/p>\n\n\n\n<p>[\ud83d\udd90 Credit] Microsoft Zero Trust &amp; Conditional Access docs<\/p>\n\n\n\n<p>Subscribe to the&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloudmarathoner&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7106249128782749696\">#cloudmarathoner<\/a>&nbsp;LinkedIn&nbsp;<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=tag&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7106249128782749696\">#tag<\/a>&nbsp;\ud83d\udc4f\ud83d\udc40<br>Stay tuned for more Cloud, Automation &amp; Security-related posts.<\/p>\n\n\n\n<p>F\u1d0f\u029f\u029f\u1d0f\u1d21 \u1d0d\u1d07 \ud83c\udfaf \u1d00\u0274\u1d05 become \u1d00\u00a0<a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=cloudmarathoner&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7106249128782749696\">#cloudmarathoner<\/a>\u00a0\u26c5\ud83c\udfc3\u200d\u2642\ufe0f\ud83c\udfc3\u200d\u2640\ufe0f &#8211; \ud835\udc0b\ud835\udc04\ud835\udc13&#8217;\ud835\udc12 \ud835\udc02\ud835\udc0e\ud835\udc0d\ud835\udc0d\ud835\udc04\ud835\udc02\ud835\udc13<br><br>\ud83d\udccc Check out the LinkedIn post \ud83d\udc49 https:\/\/www.linkedin.com\/posts\/elkhanyusubov_cloudmarathoner-tag-cloudmarathoner-activity-7106249128782749696-4k0j  <a href=\"https:\/\/www.linkedin.com\/feed\/hashtag\/?keywords=sharingiscaring&amp;highlightedUpdateUrns=urn%3Ali%3Aactivity%3A7105937876332277762\">#sharingiscaring<\/a>\u00a0\u2764\ufe0f<\/p>\n<div class=\"pvc_clear\"><\/div><p id=\"pvc_stats_1944\" class=\"pvc_stats all  \" data-element-id=\"1944\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p><div class=\"pvc_clear\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hello Cloud Marathoners! We live in a rapidly evolving security landscape \ud83d\udd10 \ud83d\udee1 with new challenges every day. Even after the pandemic, our work continues to be blended with remote work where many organizations enabled the BYOD policies to increase productivity of the people. Growing landscape of cybersecurity attacks Relaxed controls on IT assets, welcomed &hellip; <a href=\"https:\/\/thecloudmarathoner.com\/index.php\/2023\/08\/31\/what-services-you-could-use-to-apply-zero-trust-%f0%9f%9a%b7-principles-in-your-cloud-environment-%e2%81%89-%f0%9f%a4%94\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;What services you could use to apply Zero Trust \ud83d\udeb7 principles in your cloud environment \u2049 \ud83e\udd14&#8221;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33,34,23,15],"tags":[],"class_list":["post-1944","post","type-post","status-publish","format-standard","hentry","category-governance","category-identity-and-access-management","category-azure-security-center","category-security-governance"],"_links":{"self":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/comments?post=1944"}],"version-history":[{"count":4,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1944\/revisions"}],"predecessor-version":[{"id":1952,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/posts\/1944\/revisions\/1952"}],"wp:attachment":[{"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/media?parent=1944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/categories?post=1944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thecloudmarathoner.com\/index.php\/wp-json\/wp\/v2\/tags?post=1944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}