Zero Trust

Zero Trust is a modern security model used in Microsoft Azure and Microsoft Entra ID. The idea is simple:

Never trust anyone automatically. Always verify everything. Assume attackers are already inside. This is confirmed directly by Microsoft’s Zero Trust documentation, which defines it as a strategy that assumes breach and verifies each request as though it originated from an uncontrolled network.

WHY ZERO TRUST EXISTS

Old security model (“castle and moat”)

If you’re inside the company network, you’re trusted. Only people outside the firewall are considered dangerous.

Problem today: Employees work from home, cloud apps, mobiles… attackers can steal credentials easily.

New security reality

Modern solution = Zero Trust

ZERO TRUST PRINCIPLES

Microsoft defines three basic principles for Zero Trust:

1. Verify explicitly

Always check:

Example: If user logs in from location A normally, but suddenly from Location B → Azure blocks or asks MFA.

2. Use least‑privilege access

Give only the minimum access needed.

Includes:

*Example: A developer should not have full admin access to all Azure resources — only the VM he needs.

3. Assume breach

Act as if attackers are already inside. So we:

Example: Even if someone hacks a VM, they cannot reach the SQL database because the network is segmented.

ZERO TRUST ARCHITECTURE IN AZURE – HOW IT WORKS

Microsoft explains that Zero Trust extends across the entire digital estate including identity, devices, data, network, infrastructure, and operations. Microsoft currently uses 7 main pillars, and recently added an AI pillar.

  1. Identity
  2. Devices
  3. Data
  4. Network
  5. Infrastructure
  6. Security Operations
  7. AI (New)

1. Identity (Most Important)

Identity = users + apps + service principals

Microsoft says protecting identities is a foundational step. Tools used:

Example: If user signs in from a new device → Conditional Access forces MFA + checks device compliance.

2. Devices

Manage and secure devices using:

Example: If a laptop has outdated antivirus → access to SharePoint is blocked.

3. Data

Data must be classified, encrypted, and protected. Tools:

Example: Financial data in a SQL database is automatically encrypted and cannot be downloaded to personal devices.

4. Network

Block lateral movement. Tools:

*Example: Developers’ VMs cannot reach production VMs (different subnet + NSG).

5. Infrastructure

Protecting Azure resources like:

Includes:

6. Security Operations (SecOps)

Tools used:

Example: If unusual sign-in activity is detected → Sentinel triggers automated actions like disabling the account.

7. AI

Microsoft recently added AI Resources as a dedicated pillar. AI agents, copilots, and model servers need protection like any other workload.

HOW AZURE IMPLEMENTS ZERO TRUST (Technical Mapping)

Microsoft explains how the three core principles translate into Azure:

Verify explicitly implementation:

Least privilege access implementation:

Assume breach implementation:

STEP-BY-STEP EXAMPLE: ZERO TRUST FOR A COMPANY (Beginner Friendly)

Scenario

Step 1 — Strong Identity Verification

Step 2 — Device Security

Step 3 — Network Segmentation

Step 4 — Data Protection

Step 5 — Monitoring & Response

Microsoft Learn explains how Entra ID uses Zero Trust identity:

EASY ANALOGY (To Understand Zero Trust)

Imagine your office is a building:

Old model: If someone enters the building once → they can go anywhere.

Zero Trust model:

💬
AI Learning Assistant