{"id":526,"date":"2021-10-06T12:10:17","date_gmt":"2021-10-06T11:10:17","guid":{"rendered":"https:\/\/staging.greenboxdesigns.com\/cloud-direct-learning-hub\/wp\/?p=525"},"modified":"2024-11-25T21:37:09","modified_gmt":"2024-11-25T21:37:09","slug":"making-sense-of-zero-trust","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","title":{"rendered":"Making sense of Zero Trust"},"content":{"rendered":"<p><strong>An introduction to Zero Trust, the best practice security methodology<\/strong><\/p><p>With the rise of Hybrid Working, security perimeters now extend beyond your office location to any access point that hosts, stores, or accesses corporate resources and services. This is why you need to consider implementing an end-to-end security strategy, such as Zero Trust.<\/p><p>Zero Trust is a best practice security methodology used by businesses and enterprises across the world. The Zero Trust concept is built on the belief that businesses shouldn\u2019t trust anything inside or outside their perimeters and must verify anything and everything to connect their systems before granting access.<\/p><p>During this series, our experts will help you make sense of the Zero Trust best practice methodology.<\/p><p><a href=\"https:\/\/clouddirect.net\/learning-hub\/test-your-knowledge-on-zero-trust\/\"><img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"100\" class=\"alignnone size-full wp-image-1047\" src=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1.png\" alt=\"\" srcset=\"https:\/\/clouddirect.net\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1.png 768w, https:\/\/clouddirect.net\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1-300x39.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Make sense of a Zero Trust Security Strategy and why you should adopt it to secure your business.<\/p>\n","protected":false},"author":29,"featured_media":869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2,6,34,31],"tags":[],"post_media_type":[27],"class_list":["post-526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-zero-trust","category-making-sense-of-zero-trust","category-microsoft-security","post_media_type-video-series"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Making sense of Zero Trust - Learning Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making sense of Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Make sense of a Zero Trust Security Strategy and why you should adopt it to secure your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T11:10:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-25T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1025\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Making sense of Zero Trust\",\"datePublished\":\"2021-10-06T11:10:17+00:00\",\"dateModified\":\"2024-11-25T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"},\"wordCount\":124,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"articleSection\":[\"Azure\",\"Making Sense of Zero Trust\",\"Making Sense of Zero Trust\",\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\",\"name\":\"Making sense of Zero Trust - Learning Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"datePublished\":\"2021-10-06T11:10:17+00:00\",\"dateModified\":\"2024-11-25T21:37:09+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"width\":1536,\"height\":1025},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making sense of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making sense of Zero Trust - Learning Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","og_locale":"en_GB","og_type":"article","og_title":"Making sense of Zero Trust","og_description":"Make sense of a Zero Trust Security Strategy and why you should adopt it to secure your business.","og_url":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","og_site_name":"Learning Hub","article_published_time":"2021-10-06T11:10:17+00:00","article_modified_time":"2024-11-25T21:37:09+00:00","og_image":[{"width":1536,"height":1025,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"},"author":{"name":"","@id":""},"headline":"Making sense of Zero Trust","datePublished":"2021-10-06T11:10:17+00:00","dateModified":"2024-11-25T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"},"wordCount":124,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","articleSection":["Azure","Making Sense of Zero Trust","Making Sense of Zero Trust","Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","url":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","name":"Making sense of Zero Trust - Learning Hub","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","datePublished":"2021-10-06T11:10:17+00:00","dateModified":"2024-11-25T21:37:09+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","width":1536,"height":1025},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Making sense of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"","url":"https:\/\/clouddirect.net\/learning-hub\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=526"}],"version-history":[{"count":0,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/869"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=526"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}