https://store-images.s-microsoft.com/image/apps.40793.62790c6a-49f6-4773-89d8-d340402b64b0.8f34c17b-80f7-49b0-8c6e-bcb8d700006f.bdedcb78-6629-4dbe-838e-9cb69dbb88b5

Roadmap to Zero Trust: 4-Wk Assessment

Devoteam NV/SA

A pragmatic approach to a better security posture​ with Microsoft 365

With this consulting engagement, Devoteam will help you mature your security posture and draw the roadmap towards a Zero Trust model. We'll help you to understand how to implement such a Trust model with the help of Microsoft 365 security solutions like:

  • Securing the Identity: Multi-Factor Authentication & Conditional Access, Azure AD Identity Protection, Defender for Identity
  • Securing the Endpoints: Intune/Endpoint Manager, Defender for Endpoints
  • Securing the Data: DLP, Microsoft Information Protection, Office Message Encryption
  • Securing the Apps: Defender for Cloud Apps, Defender for Office 365 ...

The engagement will have 3 steps, resulting in a final Zero-Trust-roadmap:

Step 1 – Kick-off: Devoteam will align with all stakeholders to explain the goals and the approach of the exercise. Our Security consultant will present an overview of Zero-trust to ensure common understanding of the methodology. In this workshop we’re also interested to get feedback about your business goals and needs in order to maximize the value of the outcome of the assessment. The result of the workshop is to agree on the overall scope and expectations of all parties involved. ​

Step 2 – Discovery & Gap Analysis: During the discovery phase, we review the environment based on architectural documents, policies, processes as well as interviews with several key IT staff within your organization. The goal is to identify which assets are critical and to review the current technical setup. After the discovery, a deep dive comparison aligned with the Zero-trust strategy will bring up a list of gaps and areas of improvement ​

Day 3 – Compliance definition: After analyzing the collected data, we provide you relevant and contextualized recommendations and an action plan to improve your security posture, leveraging as much as possible the existing tools and technologies. We also help you to identify the key benefits which can be communicated to your management to support the migration to the zero-trust model.​

The outcome will be a roadmap with a list of immediate activities and quick wins; a list of activities to cover critical risks and a list of activities to improve overall cyber security maturity. ​

At a glance

https://store-images.s-microsoft.com/image/apps.23105.62790c6a-49f6-4773-89d8-d340402b64b0.8f34c17b-80f7-49b0-8c6e-bcb8d700006f.64bb11dd-cec4-4d92-a09a-bf535db898c2