What IT Admins Can Learn From Microsoft’s U.S. Government Zero Trust Strategy – TechDecisions

AdobeStock 428848357 ProxyEgg What IT Admins Can Learn From Microsoft's U.S. Government Zero Trust Strategy - TechDecisions

Microsoft this week published along blog post about how the IT giant is helping U.S. federal agencies adopt a Zero Trust architecture and comply with President Joe Biden’s executive order on cybersecurity, and the company’s guidelines should be a framework for any organization to strive towards.

The blog comes amid a heightened awareness of cybersecurity thanks to recent nation-state hacking campaigns and massive ransomware attacks, and as Microsoft partners with Zero Trust data management company Rubrik to bring Zero Trust solutions to the market via Microsoft Azure.

Microsoft is working with the National Institute of Standards and Technology (NIST) on the security framework outlined in the executive order, which includes a Zero Trust architecture.

Read Next: Biden Signs Executive Order On Improving U.S. Cybersecurity: What IT Pros Should Know

According to a Microsoft blog, there are five scenarios agencies should build towards the executive order, and we think IT professionals at any organization should take a look:

  • Cloud-ready authentication apps. These provide stronger multifactor authentication that can be extended to other software-as-a-service (SaaS) apps and custom claims-based applications.
  • Web apps with legacy authentication. Organizations using apps that can’t be easily rewritten for modern authentication can use the Azure Active Directory Application Proxy, which builds on the Azure AD foundation to extend Zero Trust to legacy systems.
  • Remote server administration. Administrators can secure remote administration by layering it with a strongly authenticated admin account and privileged-access workstation, which reduces the attack surface area and prevents unauthorized server-to-server management by requiring MFA and allow-listed admin devices for server administration via Azure AD Conditional Access.
  • Segment cloud administration. This allows organizations to administer Microsoft and non-Microsoft workloads from isolated, dedicated and segmented admin accounts. Auditing controls should be introduced to help keep privilege segmentation in place.
  • Network micro-segmentation. By establishing multiple levels of segmentation, organizations can achieve secure control and data planes. This can be done with Azure’s native capabilities by applying a consistent micro-segmentation strategy to protect against threats, implement defense in-depth and achieve policy-enforced continuous monitoring.

Private sector organizations are also urged in the executive order to shore up their cybersecurity, and like Microsoft, we think all organizations should take similar approaches as cyberattacks continue to run rampant across all sectors.

“Microsoft applauds this recognition of the Zero Trust strategy as a cybersecurity best practice, as well as the White House encouragement of the private sector to take “ambitious measures” in the same direction as the EO guidelines,” the company’s blog post said.

Source of this news: https://mytechdecisions.com/it-infrastructure/what-it-admins-can-learn-from-microsofts-u-s-government-zero-trust-strategy/

Related posts:

Best Free Proxy Sites and Services to Hide your Web - BollyInside
This list is about the Best Free Proxy Sites and Services to Hide your Web. We will try our best so that you understand this list Best Free Proxy Sites and Services to Hide your Web. I hope you like ...
How To Get Discord to Work at Your School or College - Alphr
How To Get Discord to Work at Your School or College Get Secure with ExpressVPN and Get 3 Months Free! Download Now Disclaimer: Some pages on this site may in...
More In-Person Scouting Looks, Headlined by Frankie Montas' Sim Game - Fangraphs
Gary A. Vasquez-USA TODAY Sports Frankie Montas was a late scratch from his Saturday start and instead, on Sunday, threw in an early-morning sim game on Oakland’s backfields. Opposing scouts in atten...
Open Secure Plant Migration | WWD - Water & Wastes Digest
Migrating from legacy system to modern controls The PLCs that the East Cherry Creek Valley (ECCV) Water & Sanitation District had been using to control the potable water treatment facilities and ...
Best VPN services to use in Thailand - The Thaiger
Due to a series of laws that censor websites and increase surveillance powers for local authorities, internet freedom has changed dramatically in Thailand. Over 100,000 websites are blocked in the co...
NYPD locates van, names person of interest in Brooklyn subway shooting - WBRZ
NEW YORK (AP) — A gunman in a gas mask and a construction vest set off a smoke canister on a rush-hour subway train in Brooklyn and shot at least 10 people Tuesday, authorities said. Police were scou...
So, what Avengers Movies Can Teach United states About Cybersecurity - Planet wide
Marvel has entertaining us for the last 10 years. We have seen gods, super-soldiers, magicians, and other irradiated warriors fight baddies at galactic scales. The eternal battle of good versus...
Modern WAF Bypass Scripting Techniques for Autonomous Attacks - InfoQ.com
Transcript [Note: please be advised that this transcript contains strong language] Xmas: I am Johnny Xmas. I have done pretty much everything there is to do in the security space. I have a rule; when...
Inferior-quality proxy services may be a safety measures concern - Jammu Kashmir Latest News | Trave...
In this age of digital technology, online privacy and safe practices has become a primary concern probably many users. A growing number of web are now opting for residential proxies ; howe...
I'm Begging You to Use a VPN at Hotels - Lifehacker
Keep your keycard with you, don’t leave valuables in your room unattended, and keep the door locked. Most of us follow basic security precautions at hotels, but I’m begging you to add one more to the...
What Are Cookies? And How To Clear Them? - Fossbytes
If you have been on the Internet long enough, you might have heard about cookies once in a while. But what exactly is a cookie? Do they our data? How can we delete them? Here we will try to answer ea...
Using DW and Psiphon to circumvent internet censorship - Deutsche Welle
One of the main missions of DW is to advocate for freedom of expression and free access to information around the world. One of the growing threats to these tenets is internet censorship. Countries a...
TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control - The Hacker News
Microsoft on Wednesday detailed a previously undiscovered technique put to use by the TrickBot malware that involves using compromised Internet of Things (IoT) devices as a go-between for establishin...
Apache HTTP Server Path Traversal & Remote Code Execution (CVE-2021-41773 & CVE-2021-42013) ...
On October 4, 2021, Apache HTTP Server Project released Security advisory on a Path traversal and File disclosure vulnerability in Apache HTTP Server 2.4.49 and 2.4.50 tracked as CVE-2021-41773 and...
'Tis the Season for the Wayward Car finance package Phish – Krebs concerned with Security - Krebs av...
The holiday shopping season really want means big business with phishers, who tend to have increased success this time of year possessing lure about a wayward product that needs redelivery. Here’s a...
Why Modernize Your Legacy Monitoring? - IT Jungle
April 25, 2022 Ash Giddings Modernization is everywhere at present, with teams actively looking to bring their business into the 21st century by transforming applications, framework, underlyi...
" new world " Lag Detected Fix Recommendations | New World - GameSkinny
Server problems have created a lot of problems for New World players at launch. The game consistently kicks out players from the game with the "Lag Detected" error message. Our guide will exp...
Thoughts After a Busy Day in Yankeeland - Views from 314 ft.
Yesterday was a very busy day in Yankeeland. The busiest it will get until the Winter Meetings, most likely, or until they make a big splash in free agency. First, the Yankees re-signed Aaron Boon...

IP Rotating Proxy Onsale

SPECIAL LIMITED TIME OFFER

00
Months
00
Days
00
Hours
00
Minutes
00
Seconds
First month free with coupon code FREE30