{"id":15786,"date":"2023-02-07T06:26:00","date_gmt":"2023-02-07T06:26:00","guid":{"rendered":"https:\/\/www.insentragroup.com\/us\/insights\/uncategorized\/the-ultimate-guide-to-zero-trust-resource\/"},"modified":"2024-03-03T19:24:59","modified_gmt":"2024-03-03T19:24:59","slug":"the-ultimate-guide-to-zero-trust","status":"publish","type":"post","link":"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/secure-workplace\/the-ultimate-guide-to-zero-trust\/","title":{"rendered":"The Ultimate Guide to Zero Trust"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"15786\" class=\"elementor elementor-15786\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-82f6c8b elementor-section-content-middle elementor-section-stretched elementor-hidden-tablet elementor-hidden-mobile elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82f6c8b\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-f4877f6\" data-id=\"f4877f6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7af2b21 elementor-widget elementor-widget-heading\" data-id=\"7af2b21\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Ultimate Guide to Zero Trust<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b377ae7 elementor-widget elementor-widget-text-editor\" data-id=\"b377ae7\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Everything you need to know about Zero Trust<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b26f74f elementor-widget elementor-widget-button\" data-id=\"b26f74f\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#zerotrustdl-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-d69617a\" data-id=\"d69617a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-523d566 elementor-widget elementor-widget-image\" data-id=\"523d566\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"750\" height=\"677\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png\" class=\"attachment-large size-large wp-image-14747\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-300x271.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-768x694.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1536x1387.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1568x1416.png 1568w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9.png 1819w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:90.32%;max-width:1819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e56ae33 elementor-section-content-middle elementor-section-stretched elementor-hidden-desktop elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e56ae33\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4950970\" data-id=\"4950970\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8afee44 elementor-widget elementor-widget-image\" data-id=\"8afee44\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"750\" height=\"678\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-768x694.png\" class=\"attachment-medium_large size-medium_large wp-image-14747\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-768x694.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-300x271.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1024x925.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1536x1387.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9-1568x1416.png 1568w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_9.png 1819w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:90.32%;max-width:1819px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1dfbb5b elementor-widget elementor-widget-heading\" data-id=\"1dfbb5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">The Ultimate Guide to Zero Trust\u200b<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d71b908 elementor-widget elementor-widget-text-editor\" data-id=\"d71b908\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Everything you need to know about Zero Trust<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba841c elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2ba841c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#zerotrustdl-form\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download eBook<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-536ddb0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"536ddb0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-5aff13e\" data-id=\"5aff13e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b6e00f7 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-mobile elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"b6e00f7\" data-element_type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f0fe4a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f0fe4a2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8710e45\" data-id=\"8710e45\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-16ed4a7 elementor-widget elementor-widget-html\" data-id=\"16ed4a7\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n    body.blog-thank-you-page .elementor-location-header,\r\n    body.blog-thank-you-page .elementor-location-footer,\r\n    body.blog-thank-you-page #hs-eu-cookie-confirmation {\r\n        display: nones !important;\r\n    }\r\n    body.position-fixedform section {\r\n    -webkit-filter: blur(5px);\r\n    -moz-filter: blur(5px);\r\n    -o-filter: blur(5px);\r\n    -ms-filter: blur(5px);\r\n    filter: blur(5px);\r\n    }\r\n    body.position-fixedform.blog-form-submitted .elementor-section-wrap > section {\r\n    -webkit-filter: none;\r\n    -moz-filter: none;\r\n    -o-filter: none;\r\n    -ms-filter: none;\r\n    filter: none;\r\n    }\r\n    body.position-submittedform .elementor-section-wrap > section#zerotrustdl-form {\r\n        display: none !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form {\r\n    position: fixed !important;\r\n    top: 15% !important;\r\n    width: auto !important;\r\n    left: 10% !important;\r\n    right: 10% !important;\r\n    background: #fff !important;\r\n    box-shadow: 0px 0px 10px rgb(0 0 0 \/ 20%) !important;\r\n    z-index: 99999 !important;\r\n    border-radius: 12px !important;\r\n    overflow: hidden !important;\r\n    -webkit-filter: none !important;\r\n    -moz-filter: none !important;\r\n    -o-filter: none !important;\r\n    -ms-filter: none !important;\r\n    filter: none !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form section {\r\n    -webkit-filter: none !important;\r\n    -moz-filter: none !important;\r\n    -o-filter: none !important;\r\n    -ms-filter: none !important;\r\n    filter: none !important;\r\n    }\r\n    body.position-fixedform.blog-form-submitted section#zerotrustdl-form {\r\n    position: inherit !important;\r\n    top: inherit !important;\r\n    width: auto !important;\r\n    left: inherit !important;\r\n    right: inherit !important;\r\n    box-shadow: none !important;\r\n    border-radius: 0px !important;\r\n    overflow: inherit !important;\r\n    }\r\n    @media only screen and (max-width: 600px) {\r\n     \r\n    body.position-fixedform section#zerotrustdl-form {\r\n    position: fixed !important;\r\n    top: 15% !important;\r\n    width: auto !important;\r\n    left: 10px !important;\r\n    right: 10px !important;\r\n    }\r\n    body.position-fixedform section#zerotrustdl-form section {\r\n        max-height: 500px;\r\n        overflow-y: auto;\r\n    }\r\n    \r\n    }\r\n<\/style>\r\n<script>\r\n    jQuery(function($){\r\nvar isAlreadyPopUp = true;\r\nvar htmlContent = '<h6 style=\"font-weight:bold !important;\">Transform Your Reading Experience - eBook or Blog the choice is yours!<\/h6><p class=\"mb-4\">Take control of your reading with our engaging content, available in either eBook or blog format. Choose eBook for an easier read or continue with the blog for a classic feel.<\/p>';\r\n$(\"#zerotrustdl-form script:first-child\").before(htmlContent);\r\nvar curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n\/\/localStorage.setItem(curr_url, '');\r\nvar check_subms = localStorage.getItem(curr_url);\r\n\r\n\r\nif(check_subms != 'submitted'){\r\n    $(window).scroll(function () {\r\n        \/\/if(!isAlreadyPopUp){\r\n            if ($(document).scrollTop() >= $(document).height() \/ 5){\r\n                if(!$(\"body\").hasClass(\"position-submittedform\")){\r\n                    $(\"body\").addClass(\"position-fixedform\");\r\n                }\r\n                console.log(0);\r\n            } else {\r\n                $(\"body\").removeClass(\"position-fixedform\");\r\n                console.log(1);\r\n            }\r\n            \r\n        \/\/}\r\n    });\r\n} else {\r\n    $(\"body\").addClass(\"position-submittedform\");\r\n}\r\n    });\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b496b72 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b496b72\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-207ada7\" data-id=\"207ada7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-52d355b elementor-widget elementor-widget-heading\" data-id=\"52d355b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Table of Contents<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a73b11a elementor-widget elementor-widget-text-editor\" data-id=\"a73b11a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"#zerotrusttc_01\"><strong>Introduction<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_02\"><strong>A Quick Note on Terminology<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_03\"><strong>What is Zero Trust?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_04\"><strong>Why is Zero Trust so important?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_05\"><strong>How does Zero Trust Security work?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_06\"><strong>What are the Principles of Zero Trust?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_07\"><strong>What are the Pillars of Zero Trust Architecture?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_08\"><strong>What Impact will Zero Trust Security have on User Experience?\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_09\"><strong>What is the Cost Impact of Zero Trust Security?\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_10\"><strong>How to begin your Zero Trust Security Implementation\u00a0\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_11\"><strong>How to develop a Long Term Zero Trust Security Strategy Roadmap in the Microsoft Ecosystem\u00a0 <\/strong><\/a><\/p><p><a href=\"#zerotrusttc_12\"><strong>What does a Zero Trust Maturity Model look like?<\/strong><\/a><\/p><p><a href=\"#zerotrusttc_13\"><b>How Insentra can help with your Zero Trust Security Strategy<\/b><\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25efb57 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25efb57\" data-element_type=\"section\" id=\"zerotrusttc_01\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f007588\" data-id=\"f007588\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8b9729 elementor-widget elementor-widget-heading\" data-id=\"b8b9729\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">INTRODUCTION<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae7b13c elementor-widget elementor-widget-text-editor\" data-id=\"ae7b13c\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>If you live in the Information Technology industry (or just visit from time to time) then you are fully aware of the rise in cybercrime over the last decade. Even those outside of the industry have heard about many high-profile breaches which have made headline news around the world. This trend shows no sign of slowing and, in fact, the great landscape continues to rapidly evolve.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To combat the threat, companies have become hyper focused on cybersecurity. Terms like Zero Trust Architecture, Zero Trust Framework, Zero Trust Security, Zero Trust Model and Zero Trust Network are being used repeatedly. Most major security vendors, cloud platforms, management suites, networking companies and identity and access management providers are now integrating Zero Trust solutions into their existing security components and offerings.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Sometimes there are buzzwords just for the sake of buzzwords, but other times, such as this one, important sounding words or phrases can be valuable and have merit. In this guide we will explore why the Zero Trust concept\/model\/framework is essential, its core principles, the pillars it\u2019s built upon, the impact it can have on your business and how to begin to incrementally incorporate Zero Trust approaches into your existing architecture.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:616,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee0d727 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ee0d727\" data-element_type=\"section\" id=\"zerotrusttc_02\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4c3cbdb\" data-id=\"4c3cbdb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2b874c elementor-widget elementor-widget-heading\" data-id=\"c2b874c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">A QUICK NOTE ON TERMINOLOGY  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2745855 elementor-widget elementor-widget-text-editor\" data-id=\"2745855\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>While most of the core concepts of Zero Trust Architecture are universally agreed upon, you will see various interpretations with subtle differences depending on which article you read. There may be different names for certain aspects or a slightly differing number of defined pillars. These variances are only minor and do not constitute a major deviation in the intent-of or approach-to implementation of a Zero Trust Security Model.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>This paper focuses on Microsoft\u2019s definition of Zero Trust Architecture and the related offerings available across the Microsoft 365 and Azure platforms at the time of this writing. While there are many good solutions on the market, organizations already consuming Microsoft cloud services may experience an easier time implementing the Zero Trust principles as the required products are already present and integrated into the platform.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>It is also worth pointing out some organizations choose to implement security tools using a best-in-breed approach leveraging analysis trends from trusted third parties such as Gartner Magic Quadrants. While this is certainly a valid approach, and you may see small gains in various feature sets, there is an overall loss of visibility and control when compared to a single platform managing the end-end solution of identity, applications, data, threat protection and device management. Yes, you are theoretically putting all your eggs in one basket, but you are certainly not alone. Many global organizations are doing just this and achieving successful outcomes. As is often the case, these decisions come down to the delicate balancing act of managing risk for your organization.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bb7d4e elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4bb7d4e\" data-element_type=\"section\" id=\"zerotrusttc_03\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-9c13d39\" data-id=\"9c13d39\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8df856b elementor-widget elementor-widget-heading\" data-id=\"8df856b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IS ZERO TRUST? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94ad670 elementor-widget elementor-widget-text-editor\" data-id=\"94ad670\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust is a philosophy first invented by John Kindervag when he was a principal analyst at Forrester Research. His famous quote is: \u201cWhen every user, packet, network interface and device is untrusted, protecting assets becomes simple.\u201d This ground-breaking concept was contrary to the industry-standard approach at the time which believed devices could be trusted by default and the network perimeter was sufficient to ward off any unsanctioned access to corporate resources.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Prior to Kindervag\u2019s observation, the approach to network security was known as the \u201cTrust but Verify\u201d method, where trust was the default posture. Once a person\u2019s identity had been validated, administrators would allow users unfettered access to the network. It also meant the endpoint the user was operating from would have unrestricted access to the entire infrastructure.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:141,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Zero Trust is effectively taking the opposite position and equates to a posture of \u201cNever Trust, Always Verify\u201d. The Trust but Verify approach can be considered fundamentally flawed if the primary goal is to prevent a compromise. By flipping this concept on its head and instead saying a device is untrusted by default, then protecting against a compromise becomes much more effective.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To be fair, let\u2019s first understand how the old philosophy became commonplace.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Once upon a time, all the valuable data in the kingdom was stored in a beautiful walled garden and was protected by a mighty firewall. To access the data, a user had to be inside the walled garden, plugged into a known network port and had to know their password.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>The armour of this strategy eventually began to crack when the bad actors realised people were inherently gullible, inquisitive and could be easily persuaded to click on things they shouldn\u2019t. Once clicked, they could voluntarily install malware on their trusted devices thereby allowing uninvited guests inside the walled garden to pillage and plunder.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:10,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5f104ed elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5f104ed\" data-element_type=\"section\" id=\"zerotrusttc_04\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3344399\" data-id=\"3344399\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-dcf6276 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"dcf6276\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-3b8ecba\" data-id=\"3b8ecba\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c9999c5 elementor-widget elementor-widget-heading\" data-id=\"c9999c5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHY IS ZERO TRUST SO IMPORTANT? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-14228fc elementor-widget elementor-widget-image\" data-id=\"14228fc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"3804\" height=\"1523\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker.png\" class=\"attachment-full size-full wp-image-15248\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker.png 3804w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-300x120.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-1024x410.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-768x307.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-1536x615.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-2048x820.png 2048w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Hacker-1568x628.png 1568w\" sizes=\"(max-width: 3804px) 100vw, 3804px\" style=\"width:100%;height:40.04%;max-width:3804px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5235cd elementor-widget elementor-widget-text-editor\" data-id=\"b5235cd\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"NormalTextRun SCXW38981487 BCX0\">The proliferation of cloud computing in the early 2000s was a game-changer. It brought great benefits by relieving <span class=\"NormalTextRun SCXW38981487 BCX0\">organisations<span class=\"NormalTextRun SCXW38981487 BCX0\"> from the burden of having to continuously manage infrastructure and allowed them to enjoy the fruits of modern and always up-to<span class=\"NormalTextRun SCXW38981487 BCX0\">-date line of business applications through the Software as a Service (SaaS) model. From a security perspective, however, things became more complicated very quickly. Now, sensitive corporate data has left the building and is resident in someone else\u2019s net<span class=\"NormalTextRun SCXW38981487 BCX0\">work being accessed over the internet (aka the most untrusted network ever!).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e23d448 elementor-widget elementor-widget-heading\" data-id=\"e23d448\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Enter Mobility <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3b9c5e elementor-widget elementor-widget-text-editor\" data-id=\"a3b9c5e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW70093443 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW70093443 BCX0\">In addition to data now being distributed across cloud <span class=\"NormalTextRun SCXW70093443 BCX0\">datacentres<span class=\"NormalTextRun SCXW70093443 BCX0\">, technological advancements have equipped users to be more mobile. If the data lives in the clou<span class=\"NormalTextRun SCXW70093443 BCX0\">d, then why should the user be bound to an office building to access it? People are more productive when they can work from home, on the road, in a hotel, at a coffee shop or even at the gym. This was embraced by organizations since more productive <span class=\"NormalTextRun SCXW70093443 BCX0\">workers<span class=\"NormalTextRun SCXW70093443 BCX0\"> equal more output and more profits for the business. So now we have users accessing sensitive corporate data from anywhere using any device at any time over the most untrusted network ever\u2026 What could go wrong?\u00a0<span class=\"EOP SCXW70093443 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f353896 elementor-widget elementor-widget-heading\" data-id=\"f353896\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">More Sophisticated Attacks <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-700fba4 elementor-widget elementor-widget-text-editor\" data-id=\"700fba4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cloud computing and mobility revolutionised how businesses operate by reducing their infrastructure footprint with cutting-edge cloud-based SaaS applications and empowering knowledge workers to be more productive by consuming data from anywhere.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>However, all this innovation came at a cost. It provided more opportunities for hackers to revolutionise how they can attack organizations for profit. The perceived small attack surface of yesteryear (the walled garden) has now expanded exponentially to the far reaches of the globe.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Money is the ultimate motivator and the bad actors haven\u2019t been resting on their laurels. Rather, they have been advancing alongside the rest of the industry. With more modern threats come more evolved attacks such as spear phishing and ransomware. The attackers graduated from just creating short-term havoc to holding data hostage and employing clandestine spying tactics to execute very targeted and well-planned attacks which are much more devastating and costly to businesses.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:10,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95f3562 elementor-widget elementor-widget-heading\" data-id=\"95f3562\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity, Identity, Identity <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-37d3e3a elementor-widget elementor-widget-text-editor\" data-id=\"37d3e3a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW42398624 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW42398624 BCX0\">Did you ever hear the real estate expression \u201cLocation, Location, Location\u201d? It means more than anything else, the location of a property determines its value. Well in a Trust but Verify <span class=\"NormalTextRun SCXW42398624 BCX0\">approach,<span class=\"NormalTextRun SCXW42398624 BCX0\"> identity, more than anything else determines acces<span class=\"NormalTextRun SCXW42398624 BCX0\">s to resources. A credential (username and password) is the only information required to impersonate an identity. If the identity verifies the trust, then the identity is the key to the kingdom. Whether it is to use the identity to steal data, lay malware, encrypt <span class=\"NormalTextRun SCXW42398624 BCX0\">data for ransom or gather exploitable intelligence from the birds-eye-view of an insider, identity theft has become the number one manner <span class=\"NormalTextRun SCXW42398624 BCX0\">organisations<span class=\"NormalTextRun SCXW42398624 BCX0\"> have been breached in the current day. For this reason, identity has been coined the \u201cnew perimeter\u201d or <span class=\"NormalTextRun SCXW42398624 BCX0\">\u201cnew security boundary.\u201d<span class=\"EOP SCXW42398624 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3234252 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3234252\" data-element_type=\"section\" id=\"zerotrusttc_05\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-be3f603\" data-id=\"be3f603\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8c80200 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c80200\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-8d075f7\" data-id=\"8d075f7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6db216d elementor-widget elementor-widget-heading\" data-id=\"6db216d\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW DOES ZERO TRUST SECURITY WORK? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b8e2df elementor-widget elementor-widget-text-editor\" data-id=\"1b8e2df\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In a Zero Trust Security Model we treat every access attempt the same, regardless of where it originated. Don\u2019t blindly trust a device because it is within the corporate network boundary. Don\u2019t simply assume a correct password means the user must be who they say they are. Don\u2019t conclude someone connecting from an unknown location must be on an exotic vacation.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:341,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Do harden the estate and prepare for a compromise as if it is inevitable. Do apply containment strategies and limit exposure if\/when there is a breach of security by limiting what can be accessed, by whom, from where and from which device. Don\u2019t allow access to unnecessary resources or provide excess privileges above what are needed. Audit access and monitor and alert on anomalous behavior.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A walk in the park, right? Let\u2019s break things down.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c6feb56 elementor-widget elementor-widget-image\" data-id=\"c6feb56\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3946\" height=\"2639\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify.png\" class=\"attachment-full size-full wp-image-15249\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify.png 3946w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-300x201.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-1024x685.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-768x514.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-1536x1027.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-2048x1370.png 2048w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Verify-1568x1049.png 1568w\" sizes=\"(max-width: 3946px) 100vw, 3946px\" style=\"width:100%;height:66.88%;max-width:3946px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ba9f9d3 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ba9f9d3\" data-element_type=\"section\" id=\"zerotrusttc_06\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b34a2fd\" data-id=\"b34a2fd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05389c1 elementor-widget elementor-widget-heading\" data-id=\"05389c1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT ARE THE PRINCIPLES OF ZERO TRUST SECURITY?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a58ab42 elementor-widget elementor-widget-heading\" data-id=\"a58ab42\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Never Trust, Always Verify (Verify Explicitly)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a870bb elementor-widget elementor-widget-text-editor\" data-id=\"7a870bb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The first core principle of Zero Trust requires all touchpoints of an access request be scrutinised and forced to attest to their authenticity and level of trust. The manner of inspection can include the identity of the user, location the access is originating from, type of device used, security posture of the device, type of request, etc. With this approach, neither a compromised endpoint nor a stolen identity is enough to gain unauthorised access.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:184,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Only when all conditions of the request are satisfied will access be granted. This cycle is repeated for subsequent access requests and inherent trust is never implied.<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:396,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d7f1ca elementor-widget elementor-widget-heading\" data-id=\"8d7f1ca\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Apply Least Privilege Access  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0c0ac3f elementor-widget elementor-widget-text-editor\" data-id=\"0c0ac3f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW143289777 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW143289777 BCX0\">Another core principle of Zero Trust is to provide just enough access to data and<span class=\"NormalTextRun SCXW143289777 BCX0\"> applications as is necessary to perform a function. In this way, we apply the principle of Assume Breach (see below) on a micro-scale. If we assume an identity will be compromised, limiting its level of access reduces the attack surface and potential impa<span class=\"NormalTextRun SCXW143289777 BCX0\">ct of a breach.\u00a0<span class=\"EOP SCXW143289777 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:110,&quot;335559739&quot;:360,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d9479eb elementor-widget elementor-widget-heading\" data-id=\"d9479eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Assume Breach <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0dd1dfb elementor-widget elementor-widget-text-editor\" data-id=\"0dd1dfb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another aspect of the principle of Zero Trust is to assume breach. This means the final core principle of Zero Trust is to assume a breach will occur rather than hoping the systems and data will always remain secure and protected. We must assume security controls will eventually be compromised (if they haven\u2019t been already). This requires organizations to incorporate layers of security to minimise the impact of an attack when it does happen.\u00a0\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>For example; segmenting networks to protect high-value server workloads from user networks where breaches are likely to occur. Only necessary traffic should be allowed between these network segments and it should be continuously monitored. Taken a step further, micro-segmentation (the concept of creating access policies between specific network interfaces on specific nodes within the individual segments) is gaining a lot of popularity as well.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:288,&quot;335559739&quot;:0,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-55413ed elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"55413ed\" data-element_type=\"section\" id=\"zerotrusttc_07\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e18d610\" data-id=\"e18d610\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca13daf elementor-widget elementor-widget-heading\" data-id=\"ca13daf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT ARE THE PILLARS OF ZERO TRUST ARCHITECTURE? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-51bf8ef elementor-widget elementor-widget-text-editor\" data-id=\"51bf8ef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW202523817 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW202523817 BCX0\">In this section, we will discuss the six <span class=\"NormalTextRun SCXW202523817 BCX0\">(6) pillars of Zero Trust where controls and technologies should be implemented, including examples of relevant Microsoft products <span class=\"NormalTextRun SCXW202523817 BCX0\">which <span class=\"NormalTextRun SCXW202523817 BCX0\">address the specific pillar.<span class=\"EOP SCXW202523817 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:930,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-2366a57 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2366a57\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-44d7226\" data-id=\"44d7226\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc5c69b elementor-widget elementor-widget-image\" data-id=\"bc5c69b\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1217\" height=\"240\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_2.png\" class=\"attachment-full size-full wp-image-14701\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_2.png 1217w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_2-300x59.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_2-1024x202.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_2-768x151.png 768w\" sizes=\"(max-width: 1217px) 100vw, 1217px\" style=\"width:100%;height:19.72%;max-width:1217px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-65237b3 elementor-widget elementor-widget-heading\" data-id=\"65237b3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4ba4a3 elementor-widget elementor-widget-text-editor\" data-id=\"c4ba4a3\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Identity requires verification of people, service accounts and devices through strong authentication and access compliance. Taken a step further, leveraging a single identity store as the ultimate source of truth prevents \u201cidentity sprawl\u201d which happens when separate sets of credentials are maintained in various SaaS-based applications. Identity sprawl not only creates management headaches but also poses significant risk since it equates to multiple sets of vulnerable credentials per user.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Azure Active Directory Single Sign-On (SSO) offers a robust solution to manage a single identity for all SaaS applications, monitored and protected by intelligent security telemetry with visibility and control.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Finally, a well thought out Role-Based Access Control (RBAC) strategy aligned to a least privilege approach is the mechanism used to define what level of access identities have across the other pillars.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Identity\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Identity<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-19e6af7 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"19e6af7\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-fce49c4\" data-id=\"fce49c4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-c3f5684\" data-id=\"c3f5684\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-827b157 elementor-widget elementor-widget-video\" data-id=\"827b157\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/9oEyF2bdRXI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-690b1c5\" data-id=\"690b1c5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-f82f822 elementor-widget elementor-widget-heading\" data-id=\"f82f822\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpoints (Devices) <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-33552f4 elementor-widget elementor-widget-text-editor\" data-id=\"33552f4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Device Management (ZTDM) requires the ability to monitor, control and validate the level of trust of all devices in the organization. This includes the ability to confirm the device meets a minimum set of standardised requirements which attest to its overall security posture and trustworthiness. ZTDM extends to user workstations, physical and virtual appliances and IoT devices.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Endpoint Manager (Intune) offers a comprehensive cloud-first platform to manage endpoints including the ability to set Compliance Policies which will flag a device not aligned with a desired baseline.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Any device allowed to gain access to corporate resources must be considered within this pillar.<\/p><p>More on\u00a0<a href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-endpoints-secure-them-all\/\" target=\"_blank\" rel=\"noopener\">Zero Trust Endpoints<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b372def elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b372def\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0a4d671\" data-id=\"0a4d671\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-1e3ab5f\" data-id=\"1e3ab5f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-87b4632 elementor-widget elementor-widget-video\" data-id=\"87b4632\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/A74N3HKF-Jg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a6c3327\" data-id=\"a6c3327\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-015c464 elementor-widget elementor-widget-heading\" data-id=\"015c464\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Data<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f859bcb elementor-widget elementor-widget-text-editor\" data-id=\"f859bcb\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Data Security (ZTDS) requires data to be categorized and only accessible to those authorized following a least-privileged approach. Zero Trust Data Protection (ZTDP) requires data to be protected and encrypted both at rest and in transit.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Microsoft Purview, a unified data classification and governance solution contains several tools to support Data Security ranging from basic controls to highly complex content labelling including Data Loss Prevention (DLP), Information Protection, Message Encryption, Data Lifecycle Management, Compliance Management, Insider Risk Management and more.\u00a0\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>All data created and owned by the organization falls under this pillar. More on\u00a0<a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Data\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Data Security<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-16d93dd elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"16d93dd\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f7bdb83\" data-id=\"f7bdb83\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5c34af7\" data-id=\"5c34af7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78eb25a elementor-widget elementor-widget-video\" data-id=\"78eb25a\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/krejhmC2nLg&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-08842a5\" data-id=\"08842a5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-ad63d5b elementor-widget elementor-widget-heading\" data-id=\"ad63d5b\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Applications\u00a0<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6535c98 elementor-widget elementor-widget-text-editor\" data-id=\"6535c98\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Application Access (ZTAA) requires applications to be correctly configured with appropriate controls and follow a least privilege access approach to both production as well as administration layers. Access to applications should be gated and available to only trusted users and devices and data movement into and out of the applications should be monitored.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Microsoft Defender for Cloud Apps offers a comprehensive set of controls to govern and monitor both Microsoft 365 and third-party SaaS applications in addition to fundamental controls like RBAC and Conditional Access policies. Unsanctioned applications can be prevented\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\" data-contrast=\"none\">from running on endpoints with tools like AppLocker which can create whitelists of approved applications or Defender for Endpoint Indicators which can specifically block applications based flexible criteria.\u00a0<span style=\"font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>All applications used by the organization (both internal and cloud-based), must be considered under this pillar.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Applications\" target=\"_blank\" rel=\"noopener nofollow\">Zero Trust Application Access<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-080f058 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"080f058\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-2e6f648\" data-id=\"2e6f648\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-0f69f25\" data-id=\"0f69f25\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-91afb36 elementor-widget elementor-widget-video\" data-id=\"91afb36\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/VT3O9ZyRthI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ba1fd04\" data-id=\"ba1fd04\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0fdad04 elementor-widget elementor-widget-heading\" data-id=\"0fdad04\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Infrastructure<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-937b004 elementor-widget elementor-widget-text-editor\" data-id=\"937b004\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Infrastructure (ZTI) requires an organization to harden its on-premises and cloud infrastructure against attack. The management plan is often overlooked but is a critical aspect of a thorough Zero Trust Security program. In addition, limiting physical access to on-premises systems, patching for vulnerabilities and following a least privilege RBAC model are critical components of ZTI.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:222,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Tools such as Microsoft Defender for Cloud, Defender for Identity, Privileged Identity Management (PIM) and Conditional Access policies can aid in securing privileged access and monitoring.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>All infrastructure components owned and managed by the organization (both on-premises as well as cloud-based) must be considered within this pillar. More on <a href=\"https:\/\/insentra.fyi\/Zero-Trust-and-Infrastructure\" target=\"_blank\" rel=\"noopener nofollow\" data-wplink-edit=\"true\">Zero Trust Infrastructure<\/a> can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8a4e9e2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a4e9e2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f0086dd\" data-id=\"f0086dd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-6461443\" data-id=\"6461443\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-aece4e7 elementor-widget elementor-widget-video\" data-id=\"aece4e7\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/hDrLf6WtVcw?list=PLpVDQx_iPJFap5AXr37-hm-qWYt_KgKvt&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-a2ff8cd\" data-id=\"a2ff8cd\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-141f9e3 elementor-widget elementor-widget-heading\" data-id=\"141f9e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Network <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-84e4666 elementor-widget elementor-widget-text-editor\" data-id=\"84e4666\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust Network Access (ZTNA) requires the ability to segment network traffic appropriately based on a just-enough access approach. Additionally, monitoring and threat detection are commonly used to harden and protect at the network layer. Controlling access via adaptive policy and ensuring end-end encryption of all data are aspects of ZTNA.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>There are some native Microsoft tools in Azure such as Just-in-Time Access, Azure Firewall, Network and Application Security Groups and Azure Bastion which can be leveraged in cloud-based or hybrid environments as well as a myriad of third-party tools. Microsoft Defender for Endpoint also contains protection mechanisms which can control network access at the endpoint (device) level.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>All physical and virtual data networks with connectivity to the corporate environment, no matter how small, must be considered within this pillar.<\/p><p>More on\u00a0<a href=\"https:\/\/www.insentragroup.com\/us\/insights\/geek-speak\/fasttrack\/zero-trust-and-networks-it-all-starts-here\/\" target=\"_blank\" rel=\"noopener\">Zero Trust Networks<\/a>\u00a0can be found in this video.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4e434bb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4e434bb\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-367913f\" data-id=\"367913f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-8b2e33e\" data-id=\"8b2e33e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7d02518 elementor-widget elementor-widget-video\" data-id=\"7d02518\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/3ykMu6ywgWI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-f21a300\" data-id=\"f21a300\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-869979a elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"869979a\" data-element_type=\"section\" id=\"zerotrusttc_08\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e13b6b8\" data-id=\"e13b6b8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3dec9eb elementor-widget elementor-widget-heading\" data-id=\"3dec9eb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IMPACT WILL ZERO TRUST SECURITY HAVE ON USER EXPERIENCE?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-42a7093 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42a7093\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-df02ab4\" data-id=\"df02ab4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c3888eb elementor-widget elementor-widget-image\" data-id=\"c3888eb\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3935\" height=\"1948\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls.png\" class=\"attachment-full size-full wp-image-15250\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls.png 3935w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-300x149.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-1024x507.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-768x380.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-1536x760.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-2048x1014.png 2048w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Conditions-and-Controls-1568x776.png 1568w\" sizes=\"(max-width: 3935px) 100vw, 3935px\" style=\"width:100%;height:49.5%;max-width:3935px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b872f94 elementor-widget elementor-widget-text-editor\" data-id=\"b872f94\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW177825976 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW177825976 BCX0\">By now you must be thinking this must be extremely disruptive to the poor end-<span class=\"NormalTextRun SCXW177825976 BCX0\">users who will be challenged at every turn to prove themselves. This doesn\u2019t have to be the case. In fact, if Zero Trust is introduced with a well thought out and carefully planned approach, it can complement the end-user experience.\u00a0<span class=\"EOP SCXW177825976 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:178,&quot;335559739&quot;:494,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c9d6c4 elementor-widget elementor-widget-heading\" data-id=\"5c9d6c4\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3adfa7b elementor-widget elementor-widget-text-editor\" data-id=\"3adfa7b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><a href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/fasttrack\/microsoft-fasttrack-zero-trust-and-identity-shifting-the-security-controls\/\" target=\"_blank\" rel=\"noopener\">Let\u2019s take identity as an example<\/a>. We all know Multifactor Authentication (MFA) must be at the heart of any organisation&#8217;s Zero Trust Security strategy. MFA is the process of requiring a user to present something they know (such as a password) and something they have (such as an identification device like a phone) to gain access.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>While most users are accustomed to this already, it may be seen by some as burdensome to enter SMS codes to be granted access. To make this easier and more secure, most modern-day MFA products can leverage push notifications sent to authenticator applications running on smartphones and smartwatches which only require a tap to approve. Many of these applications can also be leveraged for MFA for many different sites and services in addition to the corporate assets.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>For example, you can leverage the Microsoft Authenticator application on your smartphone for all kinds of MFA enrolments including one or more Microsoft 365 tenants, VPN connections, banking sites, benefits sites, password vaults and more. It can make your life easier since you can enrol all these different services into one convenient application to protect both your corporate as well as personal identities.<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86749dc elementor-widget elementor-widget-heading\" data-id=\"86749dc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpoints<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8390107 elementor-widget elementor-widget-text-editor\" data-id=\"8390107\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Let\u2019s use identity as an example. We all know Multifactor Authentication (MFA) must. Next let\u2019s look at device verification and attestation. What would it take to verify a device is compliant with an organisation&#8217;s security standards? The answer is simple &#8211; being managed.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Insentra helps clients leverage <a href=\"https:\/\/www.insentragroup.com\/us\/services\/microsoft-fasttrack\/tune-in-to-find-out-about-intune\/\" target=\"_blank\" rel=\"noopener\">Intune<\/a> to create a cloud-first modern management solution which allows organizations to control the security posture of the device, configure policies, VPN and Wi-Fi profiles, push software, manage updates and so on. Intune also reports the compliance status of a device based on a predetermined list of requirements such as having boot security enabled, being encrypted, having a firewall turned on, running up-to-date antimalware and Endpoint Detection and Response (EDR) products, etc. This compliance status can then be evaluated by Conditional Access policies to determine if the device should be granted access to corporate applications and data.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>While this makes the business\u2019s IT, Operations and Security teams happy by streamlining enrolments and mandating a security baseline, it also benefits the end users since they get to enjoy a modern device experience with an up-to-date operating system, automatically deployed software, single sign-on capability, consistent roaming data across devices and over-the-air provisioning of new devices which can be drop-shipped directly to their homes and remotely configured using Autopilot.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p>Taking these concepts a step further, let\u2019s explore Windows Hello for Business. When users are required to register biometrics such as a fingerprint or facial recognition with Intune, this is considered and accepted as a form of MFA since the user must present something they have (finger or face) to access the device. Once they have authenticated to the device with something they have, they will no longer be challenged for MFA from any Microsoft 365 services or Azure Active Directory federated third-party SaaS applications.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-96c3072 elementor-widget elementor-widget-image\" data-id=\"96c3072\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"434\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_4_1-1024x593.jpg\" class=\"attachment-large size-large wp-image-14720\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_4_1-1024x593.jpg 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_4_1-300x174.jpg 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_4_1-768x444.jpg 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_4_1.jpg 1208w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:57.86%;max-width:1208px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-139ff40 elementor-widget elementor-widget-text-editor\" data-id=\"139ff40\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Want to see a contented end-user? Let them sign into their laptop by simply looking at the webcam, thus granting them seamless access to all their line of business applications. They won\u2019t even know this cutting-edge modern experience they are enjoying is also greatly enhancing the security posture of the organization. It\u2019s like pouring chocolate sauce on broccoli to have your kids eat a vegetable!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>These transformational projects provide value for all stakeholders, including business leadership, those responsible for risk management, operations teams and end-users. This is a win-win experience for all &#8211; a fairly simple way to gain a strong foothold into the world of Zero Trust Security while enhancing the way devices are managed and delighting end-users with a truly modern platform and experience.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A Zero Trust Security implementation requires careful planning and execution to avoid disruptions to business. Everyone affected by incoming policy changes must be prepared and informed regarding what to expect and when. This level of planning and communication will help ensure a smooth transition to your Zero Trust model.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:87,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>A bit more on Endpoint Management.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>It should be noted Intune not only manages PCs but also MacOS and mobile devices such as iOS and Android. In addition to granular control of mobile devices when fully managed, Intune has a very well thought out and light-touch way of handling Bring Your Own Device (BYOD) scenarios to ensure corporate data is still secure even though the device itself may not be fully managed (given it is owned by the employee and not the business). The best part is all these device management capabilities are controlled under a single pane of glass!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:10,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1ba4ec elementor-widget elementor-widget-image\" data-id=\"e1ba4ec\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"750\" height=\"613\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_5.jpg\" class=\"attachment-large size-large wp-image-14716\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_5.jpg 791w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_5-300x245.jpg 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/ultimate_zero_trust_img_5-768x627.jpg 768w\" sizes=\"(max-width: 750px) 100vw, 750px\" style=\"width:100%;height:81.67%;max-width:791px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-770d29d elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"770d29d\" data-element_type=\"section\" id=\"zerotrusttc_09\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6308d4d\" data-id=\"6308d4d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9b417b1 elementor-widget elementor-widget-heading\" data-id=\"9b417b1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT IS THE COST IMPACT OF ZERO TRUST SECURITY? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9411c0 elementor-widget elementor-widget-text-editor\" data-id=\"f9411c0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The implementation of Zero Trust should not be looked at as a cost saving exercise for day-to-day operating costs. You should expect to have to purchase some products and services to support this model, though there may already be some foundational components available for use depending on what products are already owned by the organization.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:168,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>However, there is a cost savings conversation when discussing how Zero Trust Security can help in avoiding and\/or mitigating the cost of data breaches. IBM\u2019s \u201cCost of Data Breach Report 2021\u201d found the cost of a breach averages $4.24 Million USD (which has increased 10% from the prior year). In this same report, IBM found a 42.3% decrease in cost of data breaches for organizations with a mature Zero Trust implementation as compared to organizations with no Zero Trust strategy in place.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Following the Assume Breach principle, organizations should not believe they will never be breached. In fact, the likelihood an organization will never be breached is extremely low. The Forrester report \u201cThe 2021 State of Enterprise Breaches\u201d found 63% of businesses have suffered a breach in the last 12 months (which is a 4% increase from the prior year).\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>These staggering numbers supports the notion whereby the cost for being prepared pales in comparison to the cost of incident response and clean-up which can include data recovery efforts, lost revenue during outages and, possibly the most destructive of all, the reputational impact.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:79,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>To quote Benjamin Franklin, \u201cBy failing to prepare you are preparing to fail,\u201d he also said: \u201cAn ounce of prevention is worth a pound of cure.\u201d Mr. Franklin would have made a great cybersecurity consultant had he been born 300 years in the future!\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Additional benefits which are more difficult to quantify with a Zero Trust Security implementation include:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:327,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><ul><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Standardising on comprehensive offerings such as Microsoft 365, Azure Active Directory and Defender often translate to consolidation and retirement of several (often legacy) disparate point solutions and services, each carrying management overhead and a Total Cost of Ownership (TCO)<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Reduced likelihood of regulatory violations and fines\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:12,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1027,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"2\">Modern compliance and cybersecurity guidelines typically align with a Zero Trust Strategy\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:36,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"-\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:1027,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[9675],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;-&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"2\">Diminished risk of data loss events and resulting legal costs\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:12,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Technology engagement has been shown to improve employee experience and satisfaction\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:37,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Increased business agility due to the flexibility and remote work capabilities inherent in a Zero Trust Security Model\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:37,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"1\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:372,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Faster adoption of new platform offerings aligned with a modern approach\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0eb5fed elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0eb5fed\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-44fa096\" data-id=\"44fa096\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f34f497 elementor-widget elementor-widget-image\" data-id=\"f34f497\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1568\" height=\"712\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-1568x712.jpg\" class=\"attachment-post-thumbnail size-post-thumbnail wp-image-15326\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-1568x712.jpg 1568w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-300x136.jpg 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-1024x465.jpg 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-768x349.jpg 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2-1536x698.jpg 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/Zero-trust-model-1-1_v2.jpg 1644w\" sizes=\"(max-width: 1568px) 100vw, 1568px\" style=\"width:100%;height:45.44%;max-width:1644px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6ab0e3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6ab0e3\" data-element_type=\"section\" id=\"zerotrusttc_10\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ccad3e4\" data-id=\"ccad3e4\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db22c8 elementor-widget elementor-widget-heading\" data-id=\"2db22c8\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW TO BEGIN YOUR ZERO TRUST SECURITY IMPLEMENTATION  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67055f0 elementor-widget elementor-widget-text-editor\" data-id=\"67055f0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW6519078 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW6519078 BCX0\">OK. get ready for a bunch of tips here.<span class=\"EOP SCXW6519078 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:52,&quot;335559737&quot;:37,&quot;335559739&quot;:293,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f260b05 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f260b05\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e4ba195\" data-id=\"e4ba195\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b19a394 elementor-widget elementor-widget-heading\" data-id=\"b19a394\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-053c28a\" data-id=\"053c28a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-134583e elementor-widget elementor-widget-text-editor\" data-id=\"134583e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">Start by taking an inventory of identities across the business and develop identity lifecycle processes to streamline on<span class=\"NormalTextRun SCXW167635420 BCX0\">boarding and offboarding. Clean up user metadata <span class=\"NormalTextRun SCXW167635420 BCX0\">and leverage dynamic group membership to manage entitlements to prevent users who change departments from retaining access no longer needed. Make sure you <a class=\"Hyperlink SCXW167635420 BCX0\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/pass-the-passwords-to-the-left-hand-side\/\" target=\"_blank\" rel=\"noopener\"><span class=\"TextRun Underlined SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">follow modern <\/a><a class=\"Hyperlink SCXW167635420 BCX0\" href=\"https:\/\/www.insentragroup.com\/au\/insights\/geek-speak\/secure-workplace\/pass-the-passwords-to-the-left-hand-side\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"TextRun Underlined SCXW167635420 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW167635420 BCX0\">password policy guidance.\u00a0<\/a><span class=\"EOP SCXW167635420 BCX0\" data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b141c3f elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b141c3f\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-37994bb\" data-id=\"37994bb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1e21313 elementor-widget elementor-widget-heading\" data-id=\"1e21313\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3b428c2\" data-id=\"3b428c2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-67afcc8 elementor-widget elementor-widget-text-editor\" data-id=\"67afcc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW224960751 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW224960751 BCX0\">Work towards an approach of <span class=\"NormalTextRun SCXW224960751 BCX0\">just enough<span class=\"NormalTextRun SCXW224960751 BCX0\"> and just-in-time access. Do not provide more access than needed for each business role. Separate administrative accounts from produ<span class=\"NormalTextRun SCXW224960751 BCX0\">ctivity accounts and challenge everyone for MFA all <span class=\"NormalTextRun SCXW224960751 BCX0\">the time. Do not treat corporate networks as trusted IP ranges because doing so opens a gaping hole in a Zero Trust model should a user identity be compromised while on an internal network.<span class=\"EOP SCXW224960751 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:228,&quot;335559737&quot;:206,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:0}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-be140ec elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"be140ec\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-7e3dd0f\" data-id=\"7e3dd0f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8ac6ba9 elementor-widget elementor-widget-heading\" data-id=\"8ac6ba9\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-2f1735b\" data-id=\"2f1735b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a879aa1 elementor-widget elementor-widget-text-editor\" data-id=\"a879aa1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW127774079 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW127774079 BCX0\">Le<span class=\"NormalTextRun SCXW127774079 BCX0\">verage a robust and intelligent identity platform for accessing all Line-of-Business SaaS applications such as Azure Active Directory. Doing so allows you to grant and revoke access and entitlements <span class=\"NormalTextRun SCXW127774079 BCX0\">from a single platform and provides a simplified approach to provisioning and de-provisioning, while combining security controls and signals across disparate systems into a single management platform with advanced threat detection capabilities.\u00a0<span class=\"EOP SCXW127774079 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:201,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f60bb4e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f60bb4e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-600e1d7\" data-id=\"600e1d7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-72ad1bc elementor-widget elementor-widget-heading\" data-id=\"72ad1bc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">4<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-065d1a2\" data-id=\"065d1a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-764d120 elementor-widget elementor-widget-text-editor\" data-id=\"764d120\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW125332262 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW125332262 BCX0\">Implement a mo<span class=\"NormalTextRun SCXW125332262 BCX0\">dern device management strategy such as Microsoft Endpoint Manager <span class=\"NormalTextRun SCXW125332262 BCX0\">(Intune) to gain full visibility and manageability of all devices <span class=\"NormalTextRun SCXW125332262 BCX0\">permitted to access identities and data while ensuring they meet compliance requirements.<span class=\"EOP SCXW125332262 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-359d061 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"359d061\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-240b3cb\" data-id=\"240b3cb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9930031 elementor-widget elementor-widget-heading\" data-id=\"9930031\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">5 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-833b327\" data-id=\"833b327\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-11d5ea1 elementor-widget elementor-widget-text-editor\" data-id=\"11d5ea1\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW102616776 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW102616776 BCX0\">Segment workloads and monitor traffic within the network using the Zero Trust solutions offered by your <span class=\"NormalTextRun SCXW102616776 BCX0\">favourite<span class=\"NormalTextRun SCXW102616776 BCX0\"> networking vendor (there are many powerful products, so it is valuable to <span class=\"NormalTextRun SCXW102616776 BCX0\">research your options). Isolate the user networks, especially wirele<span class=\"NormalTextRun SCXW102616776 BCX0\">ss, to limit access to sensitive workloads which serve no purpose and expose risk.\u00a0<span class=\"EOP SCXW102616776 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b084c12 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b084c12\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-febfd2f\" data-id=\"febfd2f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b26e99f elementor-widget elementor-widget-heading\" data-id=\"b26e99f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">6 <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-95adffb\" data-id=\"95adffb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3096d62 elementor-widget elementor-widget-text-editor\" data-id=\"3096d62\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW145276230 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145276230 BCX0\">Develop an \u2018Enterprise Acces<span class=\"NormalTextRun SCXW145276230 BCX0\">s Model\u2019 to separate admin accounts and Privilege Access Workstations (PAW) into tiers based on levels of sensitivity. Disallow higher-tiered privileged accounts from <span class=\"NormalTextRun SCXW145276230 BCX0\">signing into lower-tiered devices and PAWs and vice-versa. Use separate admin accounts <span class=\"NormalTextRun SCXW145276230 BCX0\">o<span class=\"NormalTextRun SCXW145276230 BCX0\">n-premises<span class=\"NormalTextRun SCXW145276230 BCX0\"> and in the cloud. Do not use shared local administrator credentials across endpoints. Instead, deploy a tool like Microsoft Local Administrator Password Service (LAPS) or, better yet, disable local admin accounts entirely!\u00a0<span class=\"EOP SCXW145276230 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-85a32bc elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"85a32bc\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-89c214b\" data-id=\"89c214b\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e28afbd elementor-widget elementor-widget-heading\" data-id=\"e28afbd\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">7<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-fbe7ff2\" data-id=\"fbe7ff2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fc040dc elementor-widget elementor-widget-text-editor\" data-id=\"fc040dc\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">Across all Microsoft cloud services, Conditional Access Policies (CAPs) are the glue holding it all together. As the name suggests, CAPs allow access to data and applications only when <span class=\"NormalTextRun SCXW263048533 BCX0\">certain conditions are met. If those conditions are not met, access is<span class=\"NormalTextRun SCXW263048533 BCX0\"> not granted. This is the basis of Zero Trust and should be a fundamental part of any Microsoft 365 or Azure security posture. If you own Azure Active Directory Premium 1 or 2 and you are not using <span class=\"NormalTextRun SCXW263048533 BCX0\">Conditional Access policies, then you should start today. <span class=\"NormalTextRun SCXW263048533 BCX0\">Review <a class=\"Hyperlink SCXW263048533 BCX0\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/conditional-access\/concept-conditional-access-policy-common\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\" data-ccp-charstyle=\"Hyperlink\">Common Conditional Access policies<\/a><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\"> to start. If you do not own Azure Active Directory Premium 1 or 2, <span class=\"NormalTextRun SCXW263048533 BCX0\">leverage <a class=\"Hyperlink SCXW263048533 BCX0\" href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/fundamentals\/concept-fundamentals-security-defaults\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><span class=\"TextRun Underlined SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">Conditional Access Security Defaults<\/a><span class=\"TextRun SCXW263048533 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW263048533 BCX0\">.<span class=\"EOP SCXW263048533 BCX0\" data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7603e2b elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"7603e2b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-77ecffa\" data-id=\"77ecffa\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-152a0a2 elementor-widget elementor-widget-heading\" data-id=\"152a0a2\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">8<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-01d83ec\" data-id=\"01d83ec\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9209310 elementor-widget elementor-widget-text-editor\" data-id=\"9209310\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW236388877 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW236388877 BCX0\">Develop contingency plans in the event of breach such as validating backup and recovery processes, communication policies (who, what, when and how) and risk assessments <span class=\"NormalTextRun SCXW236388877 BCX0\">to determine mitigation strategies.\u00a0<span class=\"EOP SCXW236388877 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:120,&quot;335559737&quot;:37,&quot;335559739&quot;:5,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fbb9639 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fbb9639\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-eb17bf6\" data-id=\"eb17bf6\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0a1b3e3 elementor-widget elementor-widget-heading\" data-id=\"0a1b3e3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">9<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1dabadf\" data-id=\"1dabadf\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e0631fe elementor-widget elementor-widget-text-editor\" data-id=\"e0631fe\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW254369423 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW254369423 BCX0\">Lastly (and arguably the number one or two in terms of importance!) provide education to users on safe computing practices and why security controls are important for both corporate and personal identities. Ensure the education is continuous to keep security front of mind for all workers.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-537a60d elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"537a60d\" data-element_type=\"section\" id=\"zerotrusttc_11\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4bd44d8\" data-id=\"4bd44d8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fed6a7c elementor-widget elementor-widget-heading\" data-id=\"fed6a7c\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW TO DEVELOP A LONG TERM ZERO  TRUST SECURITY STRATEGY ROADMAP IN THE MICROSOFT ECOSYSTEM  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-edc870b elementor-widget elementor-widget-text-editor\" data-id=\"edc870b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW176601290 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW176601290 BCX0\">Rome wasn\u2019t built in a day and a Zero Trust implementation won\u2019t be either. We recommend you start with the higher value initiatives mentioned above and then look to further enhance from the estab<span class=\"NormalTextRun SCXW176601290 BCX0\">lished baseline. For example, within the Microsoft ecosystem, there are more advanced features in the higher SKUs which can complement the initial rollout with little to no user impact. Once your <span class=\"NormalTextRun SCXW176601290 BCX0\">organisation<span class=\"NormalTextRun SCXW176601290 BCX0\"> is ready to mature its model, a level-up of SKU<span class=\"NormalTextRun SCXW176601290 BCX0\"> will bring loads of new functionality and features, made easier given the way Microsoft bundle their products. Here are some of the current features and services available from Microsoft today with more being developed:\u00a0<span class=\"EOP SCXW176601290 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:310,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bd0641 elementor-widget elementor-widget-heading\" data-id=\"1bd0641\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Identity Protection <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7019b30 elementor-widget elementor-widget-text-editor\" data-id=\"7019b30\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Identity Protection takes the fundamental identity controls and layers intelligent security and real-time analytics to make informed decisions about whether an identity has been compromised.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559737&quot;:144,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Identity<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bb914ba elementor-widget elementor-widget-heading\" data-id=\"bb914ba\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Identity <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e004d05 elementor-widget elementor-widget-text-editor\" data-id=\"e004d05\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Identity is a product which runs inside of the on-premises Active Directory environment and monitors Domain Controllers for anomalous behavior, common reconnaissance and attack techniques.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Identity, Infrastructure<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d84e090 elementor-widget elementor-widget-heading\" data-id=\"d84e090\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Office 365 <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7be4268 elementor-widget elementor-widget-text-editor\" data-id=\"7be4268\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Office 365 allows organizations to detect malicious links and attachments in emails and documents before users can get a chance to run them. It also includes Anti Phishing protection.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p aria-level=\"2\"><b>Pillar: Applications, Data<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e8f8b49 elementor-widget elementor-widget-heading\" data-id=\"e8f8b49\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Endpoint <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3153cd4 elementor-widget elementor-widget-text-editor\" data-id=\"3153cd4\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Defender for Endpoint is a multifaceted enterprise security platform. It includes several components which can greatly improve the security posture of endpoint devices including:\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:9,&quot;335559739&quot;:324,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><ul><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Threat and Vulnerability Management to discover, prioritise and remediate misconfigurations and vulnerabilities\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Attack Surface Reduction to harden known exploitable weaknesses in Endpoint\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:11,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Next-Generation Protection to detect modern zero-day threats\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:11,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\">Endpoint Detection and Response (EDR) to add detection, automation and response to threats which have gotten past your defences\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\">Automated Investigation and remediation to automate investigation activities and reduce the volume of alerts\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\">Microsoft Threat Experts offers a managed service providing proactive threat hunting, insights and rapid response to threats\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:57,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><li data-leveltext=\"\u2022\" data-font=\"Calibri\" data-listid=\"2\" data-list-defn-props=\"{&quot;335551500&quot;:15954232,&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:360,&quot;469769226&quot;:&quot;Calibri&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\u2022&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\">Network controls with the ability to allow or disallow access to specific locations and websites\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:252,&quot;335559740&quot;:248,&quot;335559991&quot;:360}\">\u00a0<\/li><\/ul><p>Microsoft Defender for Endpoint also integrates with Microsoft Defender for Office 365 to enable security analysts to go upstream to investigate the entry point of an attack. Through threat intelligence sharing, attacks can be contained and blocked. \u00a0<\/p><p><b>Pillar: Endpoints (Devices), Applications, Data, Network<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eaf7b26 elementor-widget elementor-widget-heading\" data-id=\"eaf7b26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Privileged Identity Management <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ccfa7a elementor-widget elementor-widget-text-editor\" data-id=\"0ccfa7a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"TextRun SCXW145991067 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145991067 BCX0\">Privileged Identity Management (PIM) offers the ability to provide just-in-time administrative access to privileged accounts. The elevations are tied to a workflow which can do things like send alert no<span class=\"NormalTextRun SCXW145991067 BCX0\">tifications, require the requestor to state the nature and purpose of why they are asking for <span class=\"NormalTextRun SCXW145991067 BCX0\">elevation and<span class=\"NormalTextRun SCXW145991067 BCX0\"> even require the elevation request to be approved by other individual(s) within the <span class=\"NormalTextRun SCXW145991067 BCX0\">organisation<span class=\"NormalTextRun SCXW145991067 BCX0\">. This will serve to provide accountability and add<span class=\"NormalTextRun SCXW145991067 BCX0\">itional checks for privileged access usage.<span class=\"LineBreakBlob BlobObject DragDrop SCXW145991067 BCX0\"><span class=\"SCXW145991067 BCX0\">\u00a0<br class=\"SCXW145991067 BCX0\" \/><span class=\"LineBreakBlob BlobObject DragDrop SCXW145991067 BCX0\"><span class=\"SCXW145991067 BCX0\">\u00a0<br class=\"SCXW145991067 BCX0\" \/><strong><span class=\"TextRun SCXW145991067 BCX0\" lang=\"EN-AU\" xml:lang=\"EN-AU\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW145991067 BCX0\">Pillar: Identity, Infrastructure, Applications<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-332f38a elementor-widget elementor-widget-heading\" data-id=\"332f38a\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Access Reviews <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc0bf99 elementor-widget elementor-widget-text-editor\" data-id=\"bc0bf99\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Access Reviews allow organizations to bundle entitlements into packages which can be applied to individuals within an organization or extended to guest accounts in a B2B scenario. This could include access to specific data and applications, Teams, SharePoint libraries, permission sets, etc. These access packages can then be configured for regularly scheduled reviews to ensure access to these entitlements is still warranted for the individual users.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity, Infrastructure, Applications, Data\u00a0<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0eabbf0 elementor-widget elementor-widget-heading\" data-id=\"0eabbf0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Azure Active Directory Password Protection <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f33b248 elementor-widget elementor-widget-text-editor\" data-id=\"f33b248\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Azure Active Directory Password Protection runs on-premises and integrates with Active Directory to disallow weak passwords by leveraging Microsoft\u2019s real-time banned password lists as well as a custom list created by the customer.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fb841e0 elementor-widget elementor-widget-heading\" data-id=\"fb841e0\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Defender For Cloud Apps  <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f8bc68 elementor-widget elementor-widget-text-editor\" data-id=\"4f8bc68\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Microsoft Defender for Cloud Apps is a cloud-native Cloud Access Security Broker (CASB) which supports various deployment modes such as log collection for the discovery of Shadow IT and a broker for access to third-party SaaS applications with either API connectors or reverse proxy. It provides rich visibility and control over data movement and sophisticated analytics to identify and combat cyber threats across all Microsoft and third-party cloud services.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:274,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p>In addition, Defender for Cloud Apps can work in tandem with Defender for Endpoint to report on application usage and block access to applications unsanctioned by the enterprise.\u00a0<span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559685&quot;:22,&quot;335559737&quot;:3,&quot;335559739&quot;:348,&quot;335559740&quot;:248,&quot;335559991&quot;:10}\">\u00a0<\/p><p><b>Pillar: Applications, Data<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d7f59cc elementor-widget elementor-widget-heading\" data-id=\"d7f59cc\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Passwordless<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-000a133 elementor-widget elementor-widget-text-editor\" data-id=\"000a133\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It has been a long-known truth our passwords are the weakest link in modern cyber security. Passwordless technologies are still evolving, however, there are a few steps you can take to begin this journey. One is leveraging Windows Hello for Business mentioned earlier in this article.\u00a0<span data-ccp-props=\"{\">\u00a0<\/p><p><strong>Pillar: Identity, Endpoints (Devices), Applications, Data<\/strong>\u00a0<span data-ccp-props=\"{\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2e262e8 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2e262e8\" data-element_type=\"section\" id=\"zerotrusttc_12\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d414a32\" data-id=\"d414a32\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8fc322e elementor-widget elementor-widget-heading\" data-id=\"8fc322e\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">WHAT DOES A ZERO TRUST MATURITY MODEL LOOK LIKE?  <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52c84a1 elementor-widget elementor-widget-heading\" data-id=\"52c84a1\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Zero Trust Architecture<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf2616 elementor-widget elementor-widget-image\" data-id=\"6cf2616\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3403\" height=\"2500\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3.png\" class=\"attachment-full size-full wp-image-15321\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3.png 3403w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-300x220.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-1024x752.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-768x564.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-1536x1128.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-2048x1505.png 2048w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-3-1568x1152.png 1568w\" sizes=\"(max-width: 3403px) 100vw, 3403px\" style=\"width:100%;height:73.46%;max-width:3403px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65df24b elementor-widget elementor-widget-text-editor\" data-id=\"65df24b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Zero Trust is not a destination, but an ongoing process which should be taken in bite sized chunks. It is good to stay closely connected to industry sources and trusted partners to stay informed and make sure you are doing your best to leverage current tools to protect your organization (particularly if you already own some of these tools).\u00a0<span data-ccp-props=\"{&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:20,&quot;335559731&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:259,&quot;335559991&quot;:10}\">\u00a0<\/p><p>Every organization\u2019s journey will be different, yet you can use the following guide as a general blueprint for success. Answer these questions to see where you are in the process.<span data-ccp-props=\"{&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:20,&quot;335559731&quot;:0,&quot;335559739&quot;:274,&quot;335559740&quot;:259,&quot;335559991&quot;:10}\">\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77c844f elementor-widget elementor-widget-image\" data-id=\"77c844f\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"3836\" height=\"2134\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2.png\" class=\"attachment-full size-full wp-image-15253\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2.png 3836w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-300x167.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-1024x570.png 1024w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-768x427.png 768w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-1536x854.png 1536w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-2048x1139.png 2048w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2022\/09\/MicrosoftTeams-image-2-1568x872.png 1568w\" sizes=\"(max-width: 3836px) 100vw, 3836px\" style=\"width:100%;height:55.63%;max-width:3836px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-12b2935 elementor-section-content-middle elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"12b2935\" data-element_type=\"section\" id=\"zerotrusttc_13\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-extended\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4315853\" data-id=\"4315853\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a94c17f elementor-widget elementor-widget-heading\" data-id=\"a94c17f\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">HOW INSENTRA CAN HELP WITH YOUR ZERO TRUST SECURITY STRATEGY <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1de865e elementor-widget elementor-widget-text-editor\" data-id=\"1de865e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"margin-bottom: 1.25em; margin-left: 0px;\">Looking to implement a Zero Trust Security strategy? Look no further than Insentra&#8217;s <a class=\"fui-Link ___1qmgydl f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh ftqa4ok f2hkw1w fhgqx19 f1olyrje f1p93eir f1h8hb77 f1x7u7e9 f10aw75t fsle3fq\" style=\"overflow-wrap: break-word;\" title=\"https:\/\/www.insentragroup.com\/us\/zero-trust-security-assessment\/\" href=\"https:\/\/www.insentragroup.com\/us\/zero-trust-security-assessment\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Zero Trust Assessment\">Zero Trust Assessment<\/a>. Our team of expert architects and consultants have the knowledge and experience to ensure a successful rollout that won&#8217;t disrupt your day-to-day operations.<\/p><p style=\"margin-bottom: 1.25em; margin-left: 0px;\">A poorly planned Zero Trust Security implementation can have catastrophic consequences for your business. That&#8217;s why choosing a trusted and strategic partner is critical. At Insentra, we offer highly customized solutions to meet the unique requirements of each customer. Our engagements range from specific tactical initiatives to long-term roadmap advisory consultations.<\/p><p>\u00a0<\/p><p style=\"margin-bottom: 0px; margin-left: 0px;\">Whether you know exactly what you need and just want help planning, or you&#8217;re not sure where to start, we&#8217;re here to help. Trust us to guide you through every step of the process and ensure a successful outcome for your business. <a class=\"fui-Link ___1qmgydl f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh ftqa4ok f2hkw1w fhgqx19 f1olyrje f1p93eir f1h8hb77 f1x7u7e9 f10aw75t fsle3fq\" style=\"overflow-wrap: break-word;\" title=\"https:\/\/www.insentragroup.com\/us\/contact\/\" href=\"https:\/\/www.insentragroup.com\/us\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link Contact us\">Contact us<\/a> today for more information on how Insentra can help with your Zero Trust Security strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-96fc950 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"96fc950\" data-element_type=\"section\" id=\"zerotrustdl-form\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-wider\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2910956\" data-id=\"2910956\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-02ff9d7 elementor-widget elementor-widget-heading\" data-id=\"02ff9d7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">DOWNLOAD THE ULTIMATE GUIDE<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0680465 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0680465\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-97370f2\" data-id=\"97370f2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-265acd6 elementor-widget elementor-widget-image\" data-id=\"265acd6\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/02\/ultimate_zero_trust_img_10.png\" class=\"attachment-large size-large wp-image-18550\" alt=\"\" srcset=\"https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/02\/ultimate_zero_trust_img_10.png 600w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/02\/ultimate_zero_trust_img_10-300x300.png 300w, https:\/\/www.insentragroup.com\/us\/wp-content\/uploads\/sites\/21\/2023\/02\/ultimate_zero_trust_img_10-150x150.png 150w\" sizes=\"(max-width: 600px) 100vw, 600px\" style=\"width:100%;height:100%;max-width:600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-b459a40\" data-id=\"b459a40\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d85a749 elementor-widget elementor-widget-html\" data-id=\"d85a749\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<style>\r\n    .form-placeholder img { \r\n        max-width:40px !important;\r\n    }\r\n    form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc {\r\n        display: none;\r\n    }\r\n    form[data-zi-mapped-form] .hideFields {\r\n        display: none !important;\r\n    }\r\n    form[data-zi-mapped-form] .hs-form-field {\r\n        width: 100% !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .hideFields {\r\n        display: block !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .hs-form-field {\r\n        width: 50% !important;\r\n    }\r\n    form[data-zi-mapped-form].incomplete .legal-consent-container .hs-form-field {\r\n        width: 100% !important;\r\n    }\r\n<\/style>\r\n<div class=\"form-placeholder text-center p-5 border rounded\"><div><img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/nz\/wp-content\/uploads\/sites\/18\/2023\/02\/loader.gif\" \/><\/div>Loading Form...<\/div>\r\n<script charset=\"utf-8\" type=\"text\/javascript\" src=\"\/\/js.hsforms.net\/forms\/embed\/v2.js\"><\/script>\r\n<script>\r\njQuery(function($){\r\n    var curr_url_checker = window.location.href; var curr_url_splitter = curr_url_checker.split(\"?\"); var curr_url = curr_url_splitter[0];\r\n    hbspt.forms.create({\r\n        region: \"na1\",\r\n        portalId: \"20799536\",\r\n        formId: \"cf765491-741f-4797-ac00-544a0914c6dc\", \/\/Change to form ID\r\n        redirectUrl: curr_url + '\/?thank-you=yes',\r\n        css: \".hs_error_rollup {display:none !important;}\", onFormReady: function($form){\r\n            $form.find('input[name=\"referral_page\"]').val(curr_url).change();\r\n            \r\n\r\nwindow._zi = {\r\nformId: 'c522941d-9546-46c0-a0a0-62ee4fb32f4b',\r\n\/\/development: true,\r\nformLoadTimeout: 200,\r\ncallbacks: {\r\nonReady: function(data) {\r\n    $('form[data-zi-mapped-form] input:not([type=\"email\"]):not([type=\"submit\"]):not([type=\"checkbox\"]):not([type=\"hidden\"]), form[data-zi-mapped-form] select').closest(\".hs-form-field\").addClass('hideFields');\r\n    $(\"form[data-zi-mapped-form]\").fadeIn();\r\n    $(\".form-placeholder\").addClass('formloaded').remove();\r\n},\r\nonMatch: function(data) {\r\nconsole.log(data);\r\nvar incomplete = false;\r\nconst entries = Object.entries(data);\r\nfor(var i=0; i<entries.length; i++){\r\n    if(entries[i][0] != 'email' && entries[i][1] == undefined){\r\n        incomplete = true;\r\n        console.log(entries[i][0]);\r\n    }\r\n}\r\n\r\nif(incomplete){\r\n    $(\"form[data-zi-mapped-form]\").addClass('incomplete');\r\n} else {\r\n    $(\"form[data-zi-mapped-form]\").removeClass('incomplete');\r\n}\r\n\r\n}\r\n}\r\n}\r\nvar zi = document.createElement('script');\r\nzi.type = 'text\/javascript';\r\nzi.async = true;\r\nzi.src = 'https:\/\/ws-assets.zoominfo.com\/formcomplete.js';\r\nvar s = document.getElementsByTagName('script')[0];\r\ns.parentNode.insertBefore(zi, s);\r\n            \r\n        }\r\n    });\r\n    \r\n    setTimeout(function(){\r\n        if($(\".form-placeholder\").hasClass('formloaded')){ } else {\r\n            $('form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc input:not([type=\"email\"]):not([type=\"submit\"]):not([type=\"checkbox\"]):not([type=\"hidden\"]), form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc select').closest(\".hs-form-field\").addClass('hideFields');\r\n            $(\"form#hsForm_cf765491-741f-4797-ac00-544a0914c6dc\").fadeIn();\r\n            $(\".form-placeholder\").addClass('formloaded').remove();\r\n        }\r\n    }, 10000);\r\n});\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc521aa thank-you-section elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc521aa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f89cd0e\" data-id=\"f89cd0e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-05b5a26 elementor-widget elementor-widget-heading\" data-id=\"05b5a26\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">THANK YOU FOR YOUR SUBMISSION!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3897e98 elementor-widget elementor-widget-image\" data-id=\"3897e98\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/www.insentragroup.com\/au\/wp-content\/uploads\/sites\/22\/2021\/09\/inquiry_email_header.jpg\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3f75220 elementor-widget elementor-widget-heading\" data-id=\"3f75220\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The form was submitted successfully.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>See how Zero Trust reduces your risk, increases productivity and improves business agility. Learn what you need to know about Zero Trust architecture. <\/p>\n","protected":false},"author":1,"featured_media":15787,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_header_footer","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"class_list":["post-15786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-workplace","entry"],"_links":{"self":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/15786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/comments?post=15786"}],"version-history":[{"count":43,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/15786\/revisions"}],"predecessor-version":[{"id":20120,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/posts\/15786\/revisions\/20120"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media\/15787"}],"wp:attachment":[{"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/media?parent=15786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/categories?post=15786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insentragroup.com\/us\/wp-json\/wp\/v2\/tags?post=15786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}