Skip to main content

Command Palette

Search for a command to run...

Note #4: Zero Trust Pilars

Zero Trust is not only for the identity layer; it's for all layers.

Updated
1 min read
Note #4: Zero Trust Pilars
A

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.

S

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

  1. Identity

    • Users and workloads

    • Authentication methods

    • Least privileged access

  2. Endpoints

    • List devices like IOT, cellphones and BYOD (Bring Your Own Device)
  3. Applications

    • Shadow IT (Check if users are using forbidden apps)

    • App permissions

    • User actions (Monitor user actions)

  4. Network

    • Traffic segmentation

    • Secure protocols

    • Inspection (Layer 3 to layer 7)

    • Monitoring

  5. Infrastructure

    • Servers(e.g. VMs)

    • Containers

    • PaaS (e.g., App Services, SQL Databases)

    • Serverless (Azure Functions, Logic Apps)

  6. Data(Most important assets**)**

    • First, discover and locate the data

    • Classify data

    • Data access control

    • DLP (Data Loss Prevention)

for more: https://learn.microsoft.com/en-us/security/zero-trust/deploy/overview

8 views

More from this blog

A

An Azure Cloud Lab Journey...

45 posts