Securing Your Workloads in Azure with a Comprehensive End-to-End Zero Trust Architecture

Jiadong Chen
2 min readFeb 8, 2023
source: Microsoft

Zero Trust architecture serves as a comprehensive end-to-end strategy. Identity, Endpoints, Applications, Network, Infrastructure and Data are important links in the end to end chain of the Zero Trust security model.

In this post, I’d like to share some resources from Microsoft to help you better understand Zero Trust Architecture in Azure!

Let’s move on!⬇️⬇️⬇️

👉 𝐈𝐝𝐞𝐧𝐭𝐢𝐭𝐢𝐞𝐬
Zero Trust starts with identity, verifying that only the people, devices and processes that have been granted access to your resources can access them.
- 📌Multi-Factor Authentication: https://lnkd.in/gcydcQfC
- 📌Passwordless authentication options: https://lnkd.in/gZFTpbYc
- 📌Conditional Access: https://lnkd.in/gkqxTCaH

👉 𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭𝐬
When users access resources including your data and apps, their endpoints may not be owned and managed by your organization. If endpoints are not up-to-date, or appropriately protected, they run the risk of data exfiltration from unknown apps or services.
- 📌Device identity: https://lnkd.in/gXyWCfCY
- 📌Endpoint Management at Microsoft: https://lnkd.in/g4Vdfej2
- 📌Device enrollment in Intune…

--

--

Jiadong Chen

Microsoft MVP, MCT | Azure Certified Solutions Architect & Cybersecurity Architect Expert | Member of .NET Foundation | Packt Author