zero trust

Zero Trust Architecture in Microsoft and Google BeyondCorp

Zero Trust Architecture in Microsoft By 2020, Microsoft identified four core scenarios to achieve zero trust. These scenarios satisfy the requirements for strong identity, enrollment in device management, and device health validation. It also made way for alternative access for un-managed devices and validation for application health. The initial scope for implementing zero trust focused on common corporate services used in the Microsoft enterprise by information workers, employees, partners, and vendors.

Traditional VPN v.s. Zero Trust Architecture

Introduction To gain access to enterprise resources, the traditional solution architecture is use VPN. For today’s cloud services, there is also zero trust architecture. If you have on-premises resources, using a traditional VPN-based remote access architecture is one way of balancing remote usability with the risk of compromise. If you have few or no on-premises services, the VPN may not required, the zero trust architecture can be very effective. If you are designing a new network, consider following the zero trust network approach instead.