Saturday, July 6, 2024

Introduction to Zero Trust in Copilot

 


Zero Trust Security Strategy

Before you introduce Microsoft Copilot for Microsoft 365 or Copilot into your environment, Microsoft recommends that you build a strong foundation of security. Fortunately, guidance for a strong security foundation exists in the form of Zero Trust. The Zero Trust security strategy treats each connection and resource request as though it originated from an uncontrolled network and a bad actor. Regardless of where the request originates or what resource it accesses, Zero Trust teaches us to "never trust, always verify."

This article provides steps to apply the principles of Zero Trust security to prepare your environment for Copilot in the following ways:

 

Zero Trust principle

Definition

Met by

Verify explicitly

Always authenticate and authorize based on all available data points.

Enforce the validation of user credentials, device requirements, and app permissions and behaviors.

Use least privileged access

Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.

Validate JEA across your organization to eliminate oversharing by ensuring that correct permissions are assigned to files, folders, Teams, and email. Use sensitivity labels and data loss prevention policies to protect data.

Assume breach

Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.

Use Exchange Online Protection (EOP) and Microsoft Defender XDR services to automatically prevent common attacks and to detect and respond to security incidents.

Watch the video series

https://youtu.be/LE52xoYlFvs

No comments:

Post a Comment

9 Shortcut Tips for Copilot with Microsoft 365

By incorporating these shortcut tips, you can make the most out of Microsoft 365 Copilot and enhance your productivity. If you have any spec...