Saturday, July 6, 2024

Introduction to Zero Trust in Copilot

 


Zero Trust Security Strategy

Before you introduce Microsoft Copilot for Microsoft 365 or Copilot into your environment, Microsoft recommends that you build a strong foundation of security. Fortunately, guidance for a strong security foundation exists in the form of Zero Trust. The Zero Trust security strategy treats each connection and resource request as though it originated from an uncontrolled network and a bad actor. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to "never trust, always verify."

This article provides steps to apply the principles of Zero Trust security to prepare your environment for Copilot in the following ways:

 

Zero Trust principle

Definition

Met by

Verify explicitly

Always authenticate and authorize based on all available data points.

Enforce the validation of user credentials, device requirements, and app permissions and behaviors.

Use least privileged access

Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.

Validate JEA across your organization to eliminate oversharing by ensuring that correct permissions are assigned to files, folders, Teams, and email. Use sensitivity labels and data loss prevention policies to protect data.

Assume breach

Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.

Use Exchange Online Protection (EOP) and Microsoft Defender XDR services to automatically prevent common attacks and to detect and respond to security incidents.

Watch the video series

https://youtu.be/LE52xoYlFvs

No comments:

Post a Comment

Why We Distrust AI Errors—and How to Build Trust

    Why We Distrust AI Errors—and How to Build Trust Keywords: AI trust, algorithmic aversion, ethical AI, explainable AI, buildi...