
Microsoft Digital is verifying identity across the environment to support a Zero Trust security model that informs how Microsoft protects its customers, data, employees, and business in an increasingly complex and dynamic digital world.
EXPLORE RELATED CONTENT
Microsoft Digital, the organization that is powering, protecting, and transforming Microsoft, is verifying identity across the environment to support a Zero Trust security model. Zero Trust provides an integrated security philosophy and end-to-end strategy that informs how Microsoft protects its customers, data, employees, and business in an increasingly complex and dynamic digital world.
Fitting identity into Zero Trust
Identity-driven security is a core pillar of the Zero Trust model. Identities define the Zero Trust security boundary, and we use identity as the primary factor in how we allow access to corporate resources. When an identity tries to access any resource, we verify that identity with strong authentication, and we ensure that access is compliant and follows the access patterns typical for that identity. We also confirm that the identity follows least-privilege access principles. With these processes in place, verified identity contributes to the broader framework for Zero Trust, alongside the other pillars of verified devices, verified access, and verified services. To learn more about our Zero Trust model and the other pillars, refer to the “For more information” section at the end of this article.
Unifying the identity environment
A unified identity environment is crucial to verified identity in the Zero Trust model. To enable a single user identity for authentication and offer a unified experience, we integrated on-premises Windows Server Active Directory forests with Azure Active Directory (Azure AD). Azure AD provides a centralized, cloud-based identity directory on which all our identity-related processes depend. We use Azure AD Connect and Active Directory Federation Services (AD FS) to unify identity data within Azure AD so that Azure–based applications can confirm the individual user attributes that make up an identity—location, organization, or job title, for example.
Every employee or partner who needs access to corporate resources is assigned an identity that is synchronized to Azure AD and gives the user access to corporate resources, Office 365, Microsoft software as a service (SaaS) applications, and third-party SaaS and platform as a service (PaaS) applications.
A key part of our business is working closely with partner companies. To enable more seamless collaboration with our partners, we’re pioneering a new multifactor authentication feature to mitigate multiple credential prompts that some users experienced. Previously, external users who had already authenticated with a second factor in their home tenant were prompted again for a different two-factor authentication to access internal Microsoft resources. Now, if our external partner has already signed in to their home tenant using multifactor authentication, they won’t encounter a separate multifactor authentication prompt when accessing the Microsoft resources.
Goals for verifying identity in Zero Trust
The Microsoft Digital approach to verified identity is rooted in three primary goals specifically related to human-based identities as they’re stored in our unified identity environment:
Enforcing strong identity
Enforcing strong identity depends on a centralized, modern, cloud-based directory solution, which we have in Azure AD. Azure AD helps us bridge our cloud and on-premises identities by using Azure AD Connect and AD FS, and it provides key functionality for enforcing strong identity across our hybrid environment:
Reducing dependency on passwords
Reducing password dependency to eliminate password usage has been in process at Microsoft for some time. Deploying a companywide strategy for eliminating passwords wasn’t easy, but it also wasn’t as complicated as many organizations might think it is. The goal isn’t to eliminate password data but to reduce the need for the user to repeatedly use that password as part of the authentication process. We’re working toward eliminating passwords at Microsoft by using several platforms and technologies:
Limiting access to data with least-privilege access
Implementing least-privilege access reduces the attack surface area for our identities with elevated privileges and ensures that our employees are always granted the level of access they require to perform the tasks their role requires. By default, identities begin with no access. In the least-privilege access model, systems grant access only when needed. Applications, services, and infrastructure only provide the minimum set of access required by their users. Our approach to least-privilege access involves several focal points:
The first step in implementing least-privilege was the identification and classification of those roles that absolutely required elevated access. However, not all elevated-privilege accounts are created equal. Limiting the attack surface visible to potential aggressors depends not only on reducing the number of elevated-privilege accounts. It also relies on only providing elevated-privilege accounts with the least-privilege access needed to get their respective jobs done.
We can provide conditional access to applications with AD FS rules. We can vary the granularity of how we enforce multifactor authentication at an application level. AD FS is flexible and allows us to designate people or groups that can access an application, and how they must authenticate when they’re on or outside the corporate network. Most users who access applications from the corporate network are allowed single-factor authentication, while users who access applications from the internet require multifactor authentication. Some applications are so critical that they require multifactor authentication even when the user accesses them from the corporate network.
Conclusion
Identity is a primary factor in determining access to corporate resources in the Zero Trust model. By enforcing strong identities, reducing dependency on passwords, and limiting access to data by using least-privilege access, we’re creating an identity framework on which the entire Zero Trust model rests. As we continue to strengthen our processes for verifying identity throughout our digital estate, we’re strengthening the remaining three pillars: device, access, and services, and, in turn, the entire Zero Trust model.
Source of the BLOG:https://www.microsoft.com/en-us/itshowcase/verifying-identity-in-a-zero-trust-model?ocid=usoc_LINKEDIN_M365_spl100002270281532