Skip to main content

Command Palette

Search for a command to run...

Note #3: Zero Trust principles

The base of zero trust

Updated
1 min read
Note #3: Zero Trust principles
A

I’m Amir Rouhanipoor, an IT Consultant specializing in Azure and cloud solutions. I help organizations streamline their IT and drive growth through secure, efficient cloud technologies.

S

Security-focused Cloud & Automation Engineer with a Master’s in Computer Science and 6+ years of experience automating and supporting enterprise IT environments across multi-site corporate and operational infrastructures. Proficient in Python scripting, Azure infrastructure, Windows Server, and identity management. Skilled in integrating third-party platforms, securing configurations, and streamlining operations. Currently pursuing the Cybersecurity Architect Expert certification with a strong focus on cloud security and automation.

1- Verify Explicitly (Authentication): No services should be accessible anonymously. We need to verify every access; everything must have an identity. People, applications, or services—verification is about authentication.

  • Strengthen authentication by using MFA or passwordless methods.

  • Conditional access policy (the new firewall in modern architecture)

  • User behavior analytics.

2- Least privilege Access(Authorization):

  • Just Enough Access (JEA)

  • Just In Time (JIT) (access for limited time) with PIM.

3- Assume breach: This is where you find hackers..

  • Network segmentation: e.g. VLanning allows only specific protocols, like SMP, to access servers.

  • Monitoring

  • Reviewing

4 views

SC-100

Part 4 of 5

The SC-100 certification, officially called Microsoft Certified: Cybersecurity Architect Expert, is designed for professionals who specialize in cybersecurity strategies and architecture.

Up next

Note #4: Zero Trust Pilars

Zero Trust is not only for the identity layer; it's for all layers.

More from this blog

A

An Azure Cloud Lab Journey...

45 posts