This browser is no longer supported.

For a better viewing experience, please consider using one of our supported browsers below.

Zero-Trust Models for Hybrid Work Environments

As we move deeper into the Hybrid Work environment, it is key that you focus on a zero-trust model in your organization. You’re probably thinking, “Why should we be focusing on this?” Because security is about keeping assets out of the hands of attackers. This used to be straight forward, because you could just put a perimeter around your corporate networks, but now with Wi-Fi, remote working, and cloud services, assets are no longer in the physical network.

Zero trust comes in to play to address these new challenges. Zero trust looks to protect these assets wherever they are, even in the public network. This requires new forms of user access control for mobile and cloud assets that can be extended to the corporate network. Modern security operations need rapid detection, response, and recovery capabilities, regardless of the location of the company assets.

The Zero Trust Framework has 3 main principals, the first being that you should always verify explicitly. Always authenticate and authorize when someone tries to access any resource. Always validate all available data points, including users’ identity and location, device health, data classifications, and any anomalies that are flagged.

The second principal you should be aware of is to consider “least privileged access” to help secure both data and productivity, as well as limit user access. You can accomplish this by implementing policies around just-in-time (JIT), just-enough-access (JEA), risk-based, and data protection against out-of-band vectors.

The third principal in the Zero Trust Framework is to always assume a breach. This helps minimize the scope of damages, segmenting networks to prevent natural movement, as well as ensuring sessions are encrypted end-to-end.

ConvergeOne’s approach to zero trust is not to disrupt end users but to keep users and data secure as they work. Using threat intelligence, risk detection, and conditional access policies, we can bring this all together. 

All these controls or principals can be implemented by utilizing Microsoft 365. In fact, Microsoft 365’s core infrastructure was designed so that zero trust policies can be implemented. ConvergeOne Microsoft Security Experts can identity gaps in your strategy so you can stay better protected and reduce the likelihood of becoming another news story.

Stay protected with Microsoft security

If you’d like to find out more about how you can implement a zero-trust policy with your Microsoft 365 subscription, get in contact with our experts today. GET STARTED
About the author:
Chris Hinch creates solutions to help people and companies work smarter, not harder. He designs, implements, secures and supports networks and configurations to help make businesses more efficient.