{"id":89070,"date":"2023-06-06T20:19:56","date_gmt":"2023-06-07T01:49:56","guid":{"rendered":"https:\/\/www.whizlabs.com\/blog\/?p=89070"},"modified":"2024-04-10T17:48:22","modified_gmt":"2024-04-10T12:18:22","slug":"implementing-zero-trust-architecture","status":"publish","type":"post","link":"https:\/\/www.whizlabs.com\/blog\/implementing-zero-trust-architecture\/","title":{"rendered":"7 Steps For Implementing Zero Trust Architecture"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In the past, companies primarily focused on securing a defined &#8220;<strong>perimeter<\/strong>&#8221; based on geographical boundaries. However, with the shift towards a cloud-centric environment, these perimeters have become obsolete and ineffective. As a result, implementing a <strong>Zero trust architecture (ZTA)<\/strong> has emerged as the essential strategy for strengthening cybersecurity defenses.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.whizlabs.com\/blog\/zero-trust-architecture-principles\/\">Implementing a Zero Trust Architecture<\/a> is a crucial step in today&#8217;s rapidly evolving cybersecurity landscape. Zero Trust Architecture is a security concept that assumes no user or device can be trusted by default, regardless of its location within the network. It focuses on verifying and validating every access request, minimizing potential attack vectors, and reducing the impact of security breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the context of <\/span><a href=\"https:\/\/www.whizlabs.com\/microsoft-azure-certification-sc-100\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">SC-100 Exam<\/span><\/a><span style=\"font-weight: 400;\">: <strong>Microsoft\u00a0 Cybersecurity Architect<\/strong>, understanding the key steps involved in implementing Zero Trust Architecture is essential. The SC-100 exam tests your knowledge and proficiency in designing and implementing robust security solutions using Microsoft technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this blog, you will walk through steps to be followed to build zero trust architecture and also brief some of the best practices to be followed to ensure security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s dig in!<\/span><\/p>\n<h3>Zero Trust Architecture Principles<\/h3>\n<p><span data-testid=\"output-sentence-0\"><span id=\"output-phrase~0~0\" class=\"css-1m8t0fv\"><span class=\"css-0\">Applying\u00a0<\/span><\/span><span id=\"output-phrase~0~1\" class=\"css-1m8t0fv\"><span class=\"css-0\">the\u00a0<\/span><\/span><span id=\"output-phrase~0~2\" class=\"css-1m8t0fv\"><span class=\"css-0\">&#8220;default\u00a0<\/span><\/span><span id=\"output-phrase~0~3\" class=\"css-1m8t0fv\"><span class=\"css-0\">deny&#8221;\u00a0<\/span><\/span><span id=\"output-phrase~0~4\" class=\"css-1m8t0fv\"><span class=\"css-0\">security\u00a0<\/span><\/span><span id=\"output-phrase~0~5\" class=\"css-1m8t0fv\"><span class=\"css-rh820s\">stance\u00a0<\/span><\/span><span id=\"output-phrase~0~6\" class=\"css-1m8t0fv\"><span class=\"css-0\">to\u00a0<\/span><span class=\"css-0\">various\u00a0<\/span><\/span><span id=\"output-phrase~0~7\" class=\"css-1m8t0fv\"><span class=\"css-rh820s\">company\u00a0<\/span><span class=\"css-0\">assets\u00a0<\/span><\/span><span id=\"output-phrase~0~8\" class=\"css-1m8t0fv\"><span class=\"css-rh820s\">provides\u00a0<\/span><\/span><span id=\"output-phrase~0~9\" class=\"css-1m8t0fv\"><span class=\"css-0\">the\u00a0<\/span><span class=\"css-rh820s\">foundation\u00a0<\/span><\/span><span id=\"output-phrase~0~10\" class=\"css-1m8t0fv\"><span class=\"css-0\">of\u00a0<\/span><span class=\"css-0\">five\u00a0<\/span><\/span><span id=\"output-phrase~0~11\" class=\"css-1m8t0fv\"><span class=\"css-0\">of\u00a0<\/span><\/span><span id=\"output-phrase~0~12\" class=\"css-1m8t0fv\"><span class=\"css-0\">these\u00a0<\/span><\/span><\/span><span data-testid=\"output-sentence-0\"><span id=\"output-phrase~0~12\" class=\"css-1m8t0fv\"><span class=\"css-0\">principles, <\/span><\/span><span id=\"output-phrase~0~13\" class=\"css-1m8t0fv\"><span class=\"css-0\">including:<\/span><\/span><\/span><\/p>\n<p><strong>Zero Trust Networks:<\/strong> For business cybersecurity or a zero trust security policy, protecting the conventional network perimeter is insufficient. A zero-trust network is typically micro-segmented, with boundaries created around each of the important assets of the firm.<\/p>\n<p>It is easy to conduct security inspections and implement access rules at these boundaries, making it simpler to stop threats from moving laterally across the network and to limit and isolate a potential breach. And thus ensuring perimeter-based security can help to attain the zero-trust networks.<\/p>\n<p><strong>Workloads with Zero Trust:<\/strong> Cybercrime rising at a higher rate and cybercriminals find cloud-based workloads, comprising assets such as containers, functions, and virtual machines, to be appealing targets, and they have particular security requirements. These resources must be protected using tailored, granular zero trust safety surveillance and access management, especially in public clouds.<\/p>\n<p><strong>Zero Trust Data:<\/strong> One of the main goals of a zero trust security strategy is to improve data security. In order to implement zero trust, it is necessary to locate data caches that are sensitive or important, map typical information flows, and provide access rules based on business requirements. The whole IT ecosystem of an organisation, including desktops, smartphones, tablets, application and database servers, and deployments in the cloud, must be uniformly established and adhered to by these standards.<\/p>\n<p><strong>Zero trust people:<\/strong> Data breaches are most often caused by compromised credentials, therefore authentication based on users and passwords is no longer acceptable. Zero trust demands strong authentication employing zero trust network access (ZTNA) and multi-factor authentication (MFA).<\/p>\n<h3><span style=\"font-weight: 400;\">7 steps for implementing zero trust Architecture\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">To help you prepare for the SC-100 exam, here are seven fundamental steps for implementing Zero Trust Architecture, tailored to the requirements of Exam SC-100 and Microsoft&#8217;s cybersecurity ecosystem.<\/span><\/p>\n<blockquote><p>Also Read: Free Question on <a href=\"https:\/\/www.whizlabs.com\/blog\/sc-100-exam-questions\/\" target=\"_blank\" rel=\"noopener\">SC-100 exam<\/a>: Microsoft Cybersecurity Architect<\/p><\/blockquote>\n<h4><b>Step 1. Forming a dedicated zero-trust team<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Zero trust is one of the most important initiatives an enterprise can undertake. Instead of placing the &#8220;<strong>move to zero trust<\/strong>&#8221; job at the bottom of everyone&#8217;s priority list, assign a small team to oversee the planning and execution of the migration.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The zero trust team can be build from the below listed specialized areas which can paves way to attain zero trust and\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">application and data security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network and infrastructure security<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">User and device security<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">In particular, having individuals from the security operations center and risk management will be highly valuable.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-89364\" src=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-scaled.webp\" alt=\"zero trust Architecture\" width=\"2560\" height=\"2370\" srcset=\"https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-scaled.webp 2560w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-300x278.webp 300w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-1024x948.webp 1024w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-768x711.webp 768w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-1536x1422.webp 1536w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-2048x1896.webp 2048w, https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/06\/zero-trust-Archiecture-150x139.webp 150w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><\/p>\n<h4><b>Step 2. Selection of zero-trust implementation on-ramp<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">In default, the zero trust security has three major on-ramps with its common technology path. The enterprise can be integrated with zero trust to all the existing on-ramps, beginning with an optimal one on the basis of the current environment and zero trust strategy.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Option 1: User and device identification<\/span><\/h4>\n<p>Organizations with a sizable population of distant users accessing cloud-based apps may find the user and device identification on-ramp to be the most appealing.<\/p>\n<p><span style=\"font-weight: 400;\">The user and device identity is found as the best option for an organization with a large group of remote users who are involved in accessing the cloud-based solutions.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Biometrics:<\/strong> The user and device can be verified with the help of this trusted technology known as biometrics. The biometric can serve as an essential part of the authentication process and it can be done on the basis of the unique physical and behavioral characteristics of the user. <\/span>Adopting biometric technology can make it easier to deploy zero trust-based user identity.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Multifactor authentication:<\/strong> This is another way to track the user to the device to a certain trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Identity and access management:<\/strong> IAM offers single based credential and single login authentication will be carried out across the various cloud platforms and internal systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Zero-trust network access:<\/strong> In order to restrict access to apps based on user identity, contextual indicators like geolocation and device security posture, and business security policies, ZTNA technology can be coupled with IAM and MFA. The Secure Access Service Edge (SASE) and security service edge systems also provide ZTNA technology as a standalone service.<\/span><\/li>\n<\/ul>\n<h4><span style=\"font-weight: 400;\">Option 2: Applications and data<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">To ensure security of the applications and data, the following practices can be followed:<\/span><\/p>\n<p><b>Data classification:<\/b><span style=\"font-weight: 400;\"> It is the practice of ensuring security level for certain data types, regardless of where the data has been stored such as cloud, data centers and endpoints etc. The data classification offers data underpinning services for the access control to achieve zero trust.<\/span><\/p>\n<p><b>Authentication and authorization of the Microservices: <\/b><span style=\"font-weight: 400;\">To take effective security initiatives, microservice authentication will be the best solution. In this method, technology such as Keycloak was adopted and it is an advanced level of authentication framework.<\/span><\/p>\n<p><b>Data loss prevention: <\/b><span style=\"font-weight: 400;\">It refers to a tool for tracking and accessing the data whether it is cloud based or on premises. And it also has certain control points for the deployment of zero trust policies.<\/span><\/p>\n<p><b>Container security:<\/b><span style=\"font-weight: 400;\"> The management and security of container groups can be achieved in an automated way with the help of container security. And it offers some of the services such as orchestration, launching, tracking, shutting down the containers and implementation of the policy across the containers.<\/span><\/p>\n<p><b>Cross-system integration through APIs<\/b><span style=\"font-weight: 400;\">: It refers to the collaboration of various cybersecurity infrastructure components. It serves as the foundation for many of the advanced security initiatives, specifically zero-trust security.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations that choose applications and data to ensure zero trust security must focus on the deployment of certain initiatives such as data classification, microservices, API integration and usage of some critical technologies such as container security and DLP. The usage of such services can enable security for the applications and data.<\/span><\/p>\n<h4><span style=\"font-weight: 400;\">Option 3: Network<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Enterprises that largely rely on a reputable internal network with networking-based controls and a sizable number of workloads that continue to be handled in an on-premises data center are a suitable fit for the network on-ramp for achieving zero trust. Additionally, it becomes sense to upgrade network-based restrictions to zero trust if the network is the present cybersecurity platform.<\/span><\/p>\n<p><b>Automation:<\/b><span style=\"font-weight: 400;\"> Streamlining network restrictions makes them dynamic, enabling the zero-trust principle of being able to cancel authorization in the middle of a session. By building their own scripts or by choosing management products with incorporated automation, engineers can automate network controls.<\/span><\/p>\n<p><b>Microsegmentation:<\/b><span style=\"font-weight: 400;\"> The core of many modern security measures, like zero trust, is microsegmentation. Instead of port, IP address, and traffic type, the concept relates to the permission of data flows depending on user and resource type.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0For instance, a list of permitted users can decide that accounting can only access system X, no matter where it is or what IP address it is using at the moment. The majority of cutting-edge network suppliers are now using microsegmentation.<\/span><\/p>\n<p><b>Centralized firewall management, cloud-based firewalls, and network virtualization: <\/b><span style=\"font-weight: 400;\">Network virtualization, cloud-based firewalls, and centrally controlled firewalls will facilitate the adoption and administration of zero-trust procedures, while they are not necessarily related to it. Automation of controls is simpler, quicker, and easier when network components are made virtual or cloud-based than when they need to be physically managed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This in turn facilitates the deployment of zero-trust policies, especially dynamic ones, quicker and simpler. No matter where they are situated or if they are virtual or physical, all of the firewalls in the organisation can be managed and configured by security teams thanks to centralised firewall administration.<\/span><\/p>\n<h4><b>Step 3: Evaluating the environment<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Implementing a zero-trust strategy will be simpler if you are aware of the controls in your environment.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Checking the security measures:\u00a0 The security controls in a network context include firewalls, internet-based gateways, and similar devices. Endpoint security, including detection and reaction to endpoints or expanded detection and response, and IAM may be the controls in a user\/identity environment. These include container safety DLP, microservices authorisation, and comparable controls in an app and information environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What degree of dynamic, specific, end-to-end trusted frameworks that are independent of preexisting categories do these restrictions provide? For instance, firewalls often don&#8217;t use granular, end-to-end, or dynamic categorisation\u00a0<\/span><\/p>\n<h4><b>Step 4. Review the available technology<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The review of existing technology for taking the initiatives of zero trust security will be a significant solution.Assess new technologies to support the zero-trust initiative&#8217;s on-ramp either concurrently with or after the evaluation. The capabilities of next-generation networking hardware, including microsegmentation, virtual routing, and stateful session management, can transform these devices into essential elements of a zero-trust architecture. IAM capabilities are rapidly evolving to become more flexible and granular.<\/span><\/p>\n<h4><b>Step 5. Launching the key zero-trust initiatives<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">The outcomes of the technology analysis should be compared to the technologies you require. The comparison helps in the development, prioritization, and implementation of activities like upgrading current network infrastructure to microsegmentation hardware or implementing microservices authentication.<\/span><\/p>\n<h4><b>Step 6. Defining operational changes<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Zero-trust solutions have the potential to drastically alter security procedures. To stay ahead of automation and avoid security breaches, for instance, comparable manual operations needs to be changed or automated.<\/span><\/p>\n<h4><b>Step 7. Deploy, rinse and repeat<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Evaluate the value of new technologies as the company implements them using security KPIs. This includes the average time it takes to put incidents under control, which ought to drop sharply the nearer an organisation gets to zero trust.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">FAQs<\/span><\/h3>\n<p><b>Is the SC 100 exam challenging?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The Microsoft Security Operations Analyst certification exam, also known as the Microsoft SC-100 exam, is rated as having a medium level of difficulty. The purpose of this exam is to evaluate a candidate&#8217;s abilities and knowledge in security surveillance, detection of threats, and incident handling in a Microsoft Azure environment.<\/span><\/p>\n<p><strong>What are the goals of Zero Trust?<\/strong><\/p>\n<div class=\"group w-full text-gray-800 dark:text-gray-100 border-b border-black\/10 dark:border-gray-900\/50 bg-gray-50 dark:bg-[#444654] sm:AIPRM__conversation__response\">\n<div class=\"flex p-4 gap-4 text-base md:gap-6 md:max-w-2xl lg:max-w-[38rem] xl:max-w-3xl md:py-6 lg:px-0 m-auto\">\n<div class=\"relative flex w-[calc(100%-50px)] flex-col gap-1 md:gap-3 lg:w-[calc(100%-115px)]\">\n<div class=\"flex flex-grow flex-col gap-3\">\n<div class=\"min-h-[20px] flex items-start overflow-x-auto whitespace-pre-wrap break-words flex-col gap-4\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light AIPRM__conversation__response\">\n<p>The main objectives of zero trust include fostering a zero trust culture, ensuring the security and defense of DoD information systems, accelerating the adoption of new technologies, and enabling the full implementation of zero trust principles.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p><b>What are the pillars of zero trust architecture?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The zero trust architecture approach includes eight (8) pillars such as User, Device, Networking, Infrastructure, Apps, Data, Visibility and Analytics, and Orchestration and Automation.<\/span><\/p>\n<p><b>How to achieve zero trust?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Implementation of Zero Trust can be achieved in 5 Easy Steps<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Set the Attack Surface in detail.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Put in place restrictions on network traffic.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a network with zero trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Create a policy of zero trust.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Monitoring the network.<\/span><\/li>\n<\/ul>\n<p><b>What is the goal of zero trust architecture?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">An approach to cybersecurity known as &#8220;zero trust&#8221; goes beyond the maxim &#8220;trust but verify&#8221; and views all networks and traffic as potentially dangerous. A zero-trust architecture aids organizations in integrating corporate and industrial infrastructure and workflows with zero-trust principles.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Summary<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hope this blog envelops detailed steps on how to deploy zero trust architecture. By implementing the above steps, you can establish a robust Zero Trust Architecture that helps to minimize the risk of unauthorized access, lateral movement, and data breaches within your organization. It demonstrates your ability to design and implement secure solutions using Microsoft technologies, a crucial skill for the Microsoft Cybersecurity Architect role.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Prepare thoroughly for the SC-100 Exam by understanding the concepts, technologies, and best practices associated with Zero Trust Architecture in Microsoft&#8217;s cybersecurity ecosystem. You can utilize some of the preparation materials like practice tests, <\/span><a href=\"https:\/\/www.whizlabs.com\/labs\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">hands on labs<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.whizlabs.com\/labs\/azure-sandbox\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">sandboxes <\/span><\/a><span style=\"font-weight: 400;\">to achieve better understanding of SC-100 exam concepts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you have any questions about this blog, please feel free to contact us!<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the past, companies primarily focused on securing a defined &#8220;perimeter&#8221; based on geographical boundaries. However, with the shift towards a cloud-centric environment, these perimeters have become obsolete and ineffective. As a result, implementing a Zero trust architecture (ZTA) has emerged as the essential strategy for strengthening cybersecurity defenses. Implementing a Zero Trust Architecture is a crucial step in today&#8217;s rapidly evolving cybersecurity landscape. Zero Trust Architecture is a security concept that assumes no user or device can be trusted by default, regardless of its location within the network. It focuses on verifying and validating every access request, minimizing potential [&hellip;]<\/p>\n","protected":false},"author":223,"featured_media":89112,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[3343],"tags":[5030,5031],"class_list":["post-89070","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-zero-trust-architecture","tag-zero-trust-architecture-principles"],"uagb_featured_image_src":{"full":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",1280,720,false],"thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-150x150.webp",150,150,true],"medium":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-300x169.webp",300,169,true],"medium_large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-768x432.webp",768,432,true],"large":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-1024x576.webp",1024,576,true],"1536x1536":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",1280,720,false],"2048x2048":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",1280,720,false],"profile_24":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",24,14,false],"profile_48":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",48,27,false],"profile_96":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",96,54,false],"profile_150":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",150,84,false],"profile_300":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect.webp",300,169,false],"tptn_thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-250x250.webp",250,250,true],"web-stories-poster-portrait":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-640x720.webp",640,720,true],"web-stories-publisher-logo":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-96x96.webp",96,96,true],"web-stories-thumbnail":["https:\/\/www.whizlabs.com\/blog\/wp-content\/uploads\/2023\/05\/Steps-for-implementing-zero-trust-Archiecture-Exam-SC-100-Microsoft-Cybersecurity-Architect-150x84.webp",150,84,true]},"uagb_author_info":{"display_name":"Dharmendra Digari","author_link":"https:\/\/www.whizlabs.com\/blog\/author\/dharmendrawhizlabs-com\/"},"uagb_comment_info":0,"uagb_excerpt":"In the past, companies primarily focused on securing a defined &#8220;perimeter&#8221; based on geographical boundaries. However, with the shift towards a cloud-centric environment, these perimeters have become obsolete and ineffective. As a result, implementing a Zero trust architecture (ZTA) has emerged as the essential strategy for strengthening cybersecurity defenses. Implementing a Zero Trust Architecture is&hellip;","_links":{"self":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/89070","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/users\/223"}],"replies":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/comments?post=89070"}],"version-history":[{"count":12,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/89070\/revisions"}],"predecessor-version":[{"id":94558,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/posts\/89070\/revisions\/94558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media\/89112"}],"wp:attachment":[{"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/media?parent=89070"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/categories?post=89070"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.whizlabs.com\/blog\/wp-json\/wp\/v2\/tags?post=89070"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}