https://store-images.s-microsoft.com/image/apps.61466.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.0ba54d01-77bb-460e-ade3-915acc9c1978.8e798670-60b7-4fa3-96dd-6102dbaeadef

Rapid Zero Trust Deployment : 8-WK Implementation

Maureen Data Systems

The purpose and objectives of this engagement are to develop a Zero Trust Implementation Strategy

The best starting point for deploying a “never trust, always verify” security model Zero Trust security models have emerged as a better alternative to traditional perimeter-based defenses, especially given the shift to remote work and expansion of the attack surface. The objectives of this engagement are to develop a Zero Trust Implementation Strategy and deployment of Zero Trust foundation security controls such as Azure AD, Intune, Conditional, and M365 security solutions.
Phase 1: Development of Zero Trust Implementation Strategy and Maturity • People o Zero Trust user experience balancing productivity and security o Adoption and change management for modernizing security o Security awareness training
• Process o Zero Trust Adoption and change management strategy for modernizing security
o Security and Compliance risk remediation alignment process o End-to-end security risk mitigation for cloud and business management o Work from anywhere on any device security process o Identity onboarding/offboarding and governance management • Technology o Advance conditional access using AAD, MEM, MCAS, Defender for Identity o Privileged account management using Azure PIM / PAM o Device security and management using MEM Intune, Defender for endpoint o Data protection and security using MIP, MCAS, and Azure Purview Phase 2: Zero Trust Foundation Implementation • Azure AD and governance, MFA, SSO, Defender for Identity protection
• Zero-trust Concept , Conditional Access o Advance device and application security integrated with zero-trust • End to end Identity governance o MDM, MAM • Identity compliance, and audits • Technologies o Primary technologies Microsoft 365 – AAD AD, Endpoint,  Azure – AD Services, Azure security center, Azure Automation • Zero Trust policies enforcement implementation will focus on • Enforcing strong identity • Ensure that a strong identity is verified and enforced. • Eliminate password-focused authentication in

Sekilas

https://store-images.s-microsoft.com/image/apps.12738.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.423c983d-733d-4c96-84f7-08be46369f15.0d8c762e-46a7-4e1a-b221-f2801fa06880
https://store-images.s-microsoft.com/image/apps.48489.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.423c983d-733d-4c96-84f7-08be46369f15.5abc6eed-f6eb-43f4-a6f7-fb685c4a510b
https://store-images.s-microsoft.com/image/apps.63718.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.423c983d-733d-4c96-84f7-08be46369f15.53b2bfe2-b8c5-47a3-bfe9-20b6ac03b79e
https://store-images.s-microsoft.com/image/apps.26856.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.423c983d-733d-4c96-84f7-08be46369f15.f42d6ec5-25c8-4ec8-b321-07120b08c7f0
https://store-images.s-microsoft.com/image/apps.32932.2f02f8bb-bcd1-41bb-8356-36036e0bcecf.423c983d-733d-4c96-84f7-08be46369f15.63da416e-11c0-4bb1-baa7-711e2c267ea4