Category: Describe the Zero Trust model
-
Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365The third element of the digital estate that must be considered when creating a risk management plan is the people who actually access the data. Whether deliberately or inadvertently, users are a constant vulnerability—if not an actual threat—to the organization’s data. After quantifying the organization’s information assets and their value and inventorying the hardware used…
-
Describe the capabilities and benefits of Microsoft Priva-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Describe the capabilities and benefits of Microsoft Priva-Describe security, compliance, privacy, and trust in Microsoft 365As mentioned frequently in this book, an organization’s data is its most valuable commodity, and keeping that data secure is one of the primary functions of Microsoft 365. That company data frequently includes confidential information, however, and it is the responsibility of the IT department not only to keep the data secure but also to…
-
Describe Microsoft Granular Delegated Admin Privileges (GDAP) principles-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Describe Microsoft Granular Delegated Admin Privileges (GDAP) principles-Describe security, compliance, privacy, and trust in Microsoft 365One of the recurrent problems for partners and other service providers supporting Microsoft 365 customers is the allocation of access permissions that enable the partner to work on the customer’s systems and services on their behalf. A feature called delegated administration privileges (DAP) has long made that possible, but DAP grants the partner full Global…
-
Data-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Data-Describe security, compliance, privacy, and trust in Microsoft 365All the security functions applying to the other five Zero Trust criteria essentially protect the organization’s data—its most valuable resource. Administrators must consider the data’s security in all possible states: in-motion, at-rest, and in-use. Depending on the nature and sensitivity of the data, each state might require different security measures. Microsoft 365 supports tools that…
-
Describe the Zero Trust model-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Describe the Zero Trust model-Describe security, compliance, privacy, and trust in Microsoft 365At one time, enterprise security could be considered a perimeter surrounding an organization. Data remained largely within the organization’s sites and could be protected from unauthorized access by firewalls, virtual private networks (VPNs), and physical barriers. Even when data began to be accessible beyond the organization using Internet websites and portable devices, the company still…
-
Something you are-Describe security, compliance, privacy, and trust in Microsoft 365
Read More: Something you are-Describe security, compliance, privacy, and trust in Microsoft 365The something you are is usually some type of biometric scan. The Windows Hello for Business feature in Windows 10 and 11 supports multifactor authentication with biometric scans as one of the factors. It is also possible to use the Microsoft Authenticator app for mobile devices as a biometric scanner that enables users to access…
Search
Popular Posts
-
Anticipating threats-Describe security, compliance, privacy, and trust in Microsoft 365
Arguably, the most difficult part of the risk management planning process is trying to anticipate all the possible threats that could afflict the company’s data in the future. The three basic risk factors for the data—confidentiality, integrity, and availability—can be exploited in any number of specific ways, but the general threat categories are listed in…
-
Classifying users-Describe security, compliance, privacy, and trust in Microsoft 365
The third element of the digital estate that must be considered when creating a risk management plan is the people who actually access the data. Whether deliberately or inadvertently, users are a constant vulnerability—if not an actual threat—to the organization’s data. After quantifying the organization’s information assets and their value and inventorying the hardware used…