MS-102: Microsoft 365 Administrator Day 8
8.17 Zero Trust

MS-102 Certification Notes

Day 8.17 - Zero Trust

Zero Trust

  • Zero Trust Principles
    • Verify Explicitly - always use all available data points to authenticate and authorize
    • Use least-privilege access - use Just in Time (JIT) and Just enough (JEA) risk based adaptive policies
    • Assume Breach - segment access to minimize attack radius. Verify encryption, use analytics and threat detection
  • Zero Trust Defense Areas
    • Identities - strong authentication
    • Endpoints - ensure compliance and device health before granting access
    • Apps - monitor activity including discovery of shadow IT
    • Data - classify and label data, encrypt and protect
    • Infrastructure - least privilege access always, monitor to detect attacks or anomalies
    • Network - devices on a network not automatically trusted. Employ threat detection solutions