The Zero Trust Model is security approach that requires continuous authentication and access verification, irrespective of location or device. Microsoft recommends three key principles: Verify explicitly, use least privilege access, and assume breach from the outset.
The defence-in-depth model is a security strategy that protects data by adding barriers and controls to slow down potential attackers. It consists of seven layers: physical security, identity and access, perimeter, network, compute, application, and data layers.
Traditionally, corporate networks were restricted, protected, and generally assumed safe. This is because only company-managed computers could join the network, VPN access was tightly controlled, and personal devices were frequently restricted or blocked.
The Zero Trust model flips that scenario. Instead of assuming that a device is safe because it was provided by the company, it requires everyone to authenticate. Then grants access based on authentication rather than location.
Microsoft highly recommends using the Zero Trust security model. The three principles to follow are:
With Zero Trust, you never stop being skeptical. Every time someone or something wants to access your valuable information (like files, databases, or systems), you authenticate and double-check if they're authorised.
In practise, this means:
Don't give users more access than the need to your Azure resources.
In practise, this means:
With Zero Trust, you start by assuming that someone has already breached your account's security. In other words, you don't trust anyone or anything, because cyber threats are always out there and you can't be sure who to trust.
In practise, this means:
Imagine your computer data, like photos, documents, and your secret cookie recipe, is in a treasure chest. You want to make sure it's safe from sneaky hackers who want to steal it, but you've never done this before.
If only there is a guide lying around that teaches you what to do to protect your data! That's where defence-in-depth comes in.
Defence-in-depth is a recommended strategy for protecting information and preventing it from being stolen by unauthorised people.
How? Through many layers of security that slow the speed of an attack that's trying to get access to your data. Think of this as having not just one big lock for your treasure chest - you're using many locks, traps, and guards to keep your treasure safe.
Like an onion, you'll have to peel through these layers one by one before you can get to your treasure chest.
Layer 1: The physical security layer is the first line of defence to protect computing hardware in the data centre. Cloud computing providers (like Azure) are responsible for securing access to buildings and controlling access to computing hardware within their data centres.
Layer 2: The identity and access layer is all about making sure that only authorised people are allowed access.
At this layer, it's important to:
Layer 3: The perimeter layer identifies network attacks before they happen, eliminating their impact, and alerting you.
At this layer, it's important to:
*In a DDoS attack, cybercriminals flood your network with so much traffic that it can't handle it all, causing services to become unavailable. DDoS protection detects these attacks early, filters out the bad traffic, and ensures your network stays up and running smoothly, protecting it from disruption.
**A perimeter firewall is a specific type of firewall that is typically deployed at the outermost boundary of a network, often called the network perimeter. Its primary role is to protect the entire network from external threats by filtering and inspecting traffic that enters or exits the network.
Layer 4: The network layer is focused on limiting the network connectivity across all your resources to only allow what's required. By limiting this communication, you reduce the risk of an attack spreading to other systems in your network.
At this layer, it's important to
Layer 5: The compute layer makes sure that your compute resources are secure.
At this layer, it's important to:
Layer 6: The application layer means reducing the security vulnerabilities in your code. Every development team should ensure that its applications are secure by default.
At this layer, it's important to:
Layer 7: The data layer controls access to business and customer data that you need to protect.
In almost all cases, attackers are after data: