Preview Mode Links will not work in preview mode

Jul 7, 2021

Apply zero trust principles and policies to your network and infrastructure with this essentials episode. It's a high-level overview of the principles of the Zero Trust security model, spanning identity, endpoints, applications, networks, infrastructure, and data.

Your network and its underlying configuration provides secure access to your resources. Infrastructure, whether on premises servers, local or cloud hosted VMs, containers, storage, or PaaS databases, all represent a critical threat vector. Jeremy Chapman, Director of Microsoft 365, walks you through how to apply the core Zero Trust tenets of verify explicitly, apply least privileged access, and assume breach for each of these layers, along with your options.

00:00 - Introduction
00:42 - Network: Verify explicitly
02:21 - Network: Least privileged access and assume breach
04:20 - Infrastructure: Verify explicitly
05:56 - Infrastructure: Least privileged access and assume breach
08:48 - Wrap up

► Link References:
Check out our other shows on Zero Trust Essentials at
Use Azure resource manager templates to deploy hands-on experiences in your Azure subscription at
Learn more at

► Unfamiliar with Microsoft Mechanics? We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.
Subscribe to our YouTube:
Join us on the Microsoft Tech Community:
Watch or listen via podcast here:

► Keep getting this insider knowledge, join us on social:
Follow us on Twitter:
Follow us on LinkedIn:
Follow us on Facebook: