{"id":526,"date":"2021-10-06T12:10:17","date_gmt":"2021-10-06T11:10:17","guid":{"rendered":"https:\/\/staging.greenboxdesigns.com\/cloud-direct-learning-hub\/wp\/?p=525"},"modified":"2026-05-12T16:06:03","modified_gmt":"2026-05-12T15:06:03","slug":"making-sense-of-zero-trust","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","title":{"rendered":"Making sense of Zero Trust"},"content":{"rendered":"\n<p><strong>An introduction to Zero Trust, the best practice security methodology<\/strong><\/p>\n\n<p>With the rise of Hybrid Working, security perimeters now extend beyond your office location to any access point that hosts, stores, or accesses corporate resources and services. This is why you need to consider implementing an end-to-end security strategy, such as Zero Trust.<\/p>\n\n<p>Zero Trust is a best practice security methodology used by businesses and enterprises across the world. The Zero Trust concept is built on the belief that businesses shouldn\u2019t trust anything inside or outside their perimeters and must verify anything and everything to connect their systems before granting access.<\/p>\n\n<p>During this series, our experts will help you make sense of the Zero Trust best practice methodology.<\/p>\n\n<p><em>Find out about our <a href=\"https:\/\/clouddirect.net\/security-compliance\/microsoft-zero-trust-security-assessment\/\">Microsoft Zero Trust Security assessment.<\/a><\/em><\/p>\n\n<p><a href=\"https:\/\/clouddirect.net\/learning-hub\/test-your-knowledge-on-zero-trust\/\"><img decoding=\"async\" loading=\"lazy\" width=\"768\" height=\"100\" class=\"alignnone size-full wp-image-1047\" src=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1.png\" alt=\"\" srcset=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1.png 768w, https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/Course-banners-14-1-300x39.png 300w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Make sense of a Zero Trust Security Strategy and why you should adopt it to secure your business.<\/p>\n","protected":false},"author":29,"featured_media":869,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2,6,34,31],"tags":[],"post_media_type":[27],"class_list":["post-526","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-zero-trust","category-making-sense-of-zero-trust","category-microsoft-security","post_media_type-video-series"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Making Sense of Zero Trust Security<\/title>\n<meta name=\"description\" content=\"Learn the principles of Zero Trust and how it strengthens modern security strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making sense of Zero Trust\" \/>\n<meta property=\"og:description\" content=\"Learn the principles of Zero Trust and how it strengthens modern security strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T11:10:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-12T15:06:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1025\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Making sense of Zero Trust\",\"datePublished\":\"2021-10-06T11:10:17+00:00\",\"dateModified\":\"2026-05-12T15:06:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"},\"wordCount\":133,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"articleSection\":[\"Azure\",\"Making Sense of Zero Trust\",\"Making Sense of Zero Trust\",\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\",\"name\":\"Making Sense of Zero Trust Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"datePublished\":\"2021-10-06T11:10:17+00:00\",\"dateModified\":\"2026-05-12T15:06:03+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"Learn the principles of Zero Trust and how it strengthens modern security strategies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg\",\"width\":1536,\"height\":1025},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/making-sense-of-zero-trust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making sense of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making Sense of Zero Trust Security","description":"Learn the principles of Zero Trust and how it strengthens modern security strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","og_locale":"en_GB","og_type":"article","og_title":"Making sense of Zero Trust","og_description":"Learn the principles of Zero Trust and how it strengthens modern security strategies.","og_url":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","og_site_name":"Learning Hub","article_published_time":"2021-10-06T11:10:17+00:00","article_modified_time":"2026-05-12T15:06:03+00:00","og_image":[{"width":1536,"height":1025,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"},"author":{"name":"","@id":""},"headline":"Making sense of Zero Trust","datePublished":"2021-10-06T11:10:17+00:00","dateModified":"2026-05-12T15:06:03+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"},"wordCount":133,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","articleSection":["Azure","Making Sense of Zero Trust","Making Sense of Zero Trust","Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","url":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/","name":"Making Sense of Zero Trust Security","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","datePublished":"2021-10-06T11:10:17+00:00","dateModified":"2026-05-12T15:06:03+00:00","author":{"@id":""},"description":"Learn the principles of Zero Trust and how it strengthens modern security strategies.","breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/fly-d-IMbquw-IQhg-unsplash-1536x1025-1.jpeg","width":1536,"height":1025},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/making-sense-of-zero-trust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Making sense of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"","url":"https:\/\/clouddirect.net\/learning-hub\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/29"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=526"}],"version-history":[{"count":1,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/526\/revisions"}],"predecessor-version":[{"id":2843,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/526\/revisions\/2843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/869"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=526"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}