Post Content
In this episode of the Azure Essentials Show, David, Eric, and Uli— our Armchair Architects—focus on Zero Trust Architecture. Their discussion covers zero trust principles, emphasizing that no user, device, or workload is inherently trusted. The trio highlight identity verification, continuous monitoring, and least privileged access, with practical examples from Microsoft. Join us to explore zero trust architecture and its impact on modern security practices. Be sure to catch part two of their conversation too.
Resources
• Microsoft Intune https://learn.microsoft.com/mem
• Microsoft Entra https://learn.microsoft.com/entra
• Azure network security https://learn.microsoft.com/azure/networking/security
• Training: Zero Trust https://learn.microsoft.com/training/modules/introduction-zero-trust-best-practice-frameworks
• Training: Microsoft Cybersecurity Architect https://learn.microsoft.com/training/courses/sc-100t00
Connect
• Ulrich (Uli) Homann https://www.linkedin.com/in/ulrichhomann
• Eric Charran https://www.linkedin.com/in/ericcharran
• David Blank-Edelman https://www.linkedin.com/in/dnblankedelman/
Related episodes
• Zero Trust Architecture (part 2) https://aka.ms/AzEssentials/183
• Watch all the Armchair Architects episodes https://aka.ms/ArmchairArchitects
Chapters
0:00 Introduction
1:14 ZTA defined
2:03 Example from Microsoft
2:46 Continuous verification
4:39 Use established solutions
5:10 Impacting network performance
5:29 Personal devices
5:58 Everything has an identity
7:49 Pop those trust bubbles
8:35 IP address not enough
9:13 Teeing up part two Read More Microsoft Developer