Note #4: Zero Trust Pilars
Zero Trust is not only for the identity layer; it's for all layers.

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.
Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

Identity
Users and workloads
Authentication methods
Least privileged access
Endpoints
- List devices like IOT, cellphones and BYOD (Bring Your Own Device)
Applications
Shadow IT (Check if users are using forbidden apps)
App permissions
User actions (Monitor user actions)
Network
Traffic segmentation
Secure protocols
Inspection (Layer 3 to layer 7)
Monitoring
Infrastructure
Servers(e.g. VMs)
Containers
PaaS (e.g., App Services, SQL Databases)
Serverless (Azure Functions, Logic Apps)
Data(Most important assets**)**
First, discover and locate the data
Classify data
Data access control
DLP (Data Loss Prevention)
for more: https://learn.microsoft.com/en-us/security/zero-trust/deploy/overview