Why wait?
Assess your Security Framework today!
Securing applications according to the Zero Trust Framework
A brief refresher
Time for a brief refresher. Securing according to the Zero Trust Framework means:
These principles for securing IT assets can be applied to all six underlying layers of the Zero Trust Framework. Dennis Vendel, Strategic Consultant in our Modern Work & Security team, shows how this is done for application security.
Put the three Zero Trust principles into practice to enhance application security
Simply put, applications are the tools for working pleasantly with data. As a result, applications also come in all shapes and sizes, and one application can also have different guises. Take Microsoft Teams, for example, which not only has a mobile app, but also apps for desktops, Web browsers, digiboards and meeting devices. However, almost all applications do have one thing in common: they ultimately connect to the same cloud service.
Therein also lies the immediate opportunity to put the three Zero Trust principles into practice. Microsoft's toolbox includes Microsoft Defender for Cloud Apps (MDCA) for this, for example. Previously, this was called MCAS. With Defender for Cloud Apps, a sharper view of the application landscape emerges and corresponding rules of the game can be created that take context into account.
Two examples to make this concrete:
Microsoft's toolbox for application security includes other components, but the importance of the big picture deserves attention as well. The six layers of the Zero Trust Framework are: Identities, Endpoints, Applications, Network, Infrastructure and Data. Applications - as part of the six layers - are not a separate piece of a puzzle, as the layers are in fact one cohesive whole.
Why wait?
Assess your Security Framework today!
To make sure you get that whole thing right, these aspects are important:
Want to know more about making applications more secure? Our teams are ready to help your organization take an active stance on IT security.
Discover more
From our Infrastructure and Security experts