{"id":618,"date":"2021-10-08T12:35:20","date_gmt":"2021-10-08T11:35:20","guid":{"rendered":"https:\/\/staging.greenboxdesigns.com\/cloud-direct-learning-hub\/wp\/?p=618"},"modified":"2024-11-25T21:37:09","modified_gmt":"2024-11-25T21:37:09","slug":"zero-trust-security-checklist","status":"publish","type":"post","link":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/","title":{"rendered":"Microsoft Zero Trust Security Checklist"},"content":{"rendered":"<p>Zero Trust is an end-to-end security strategy that\u2019s based on \u2018never trust, always verify, and has been adopted by millions of organisations around the world to protect their technology ecosystem.<\/p><p>Our Zero Trust security checklist will help you self-assess your progress in adopting a Zero Trust security strategy and determine your Hybrid Working readiness. We\u2019ll dive into the specific Microsoft tools available for you to start defending the six pillars of Zero Trust; Identities, Devices, Applications, Data, Infrastructure and Networks.<\/p>","protected":false},"excerpt":{"rendered":"<p>Our Zero Trust security checklist will help you self-assess your progress in adopting a Zero Trust security strategy.<\/p>\n","protected":false},"author":28,"featured_media":1091,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[2,6,34,31],"tags":[],"post_media_type":[25],"class_list":["post-618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","category-zero-trust","category-making-sense-of-zero-trust","category-microsoft-security","post_media_type-guide"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Microsoft Zero Trust Security Checklist - Learning Hub<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Microsoft Zero Trust Security Checklist\" \/>\n<meta property=\"og:description\" content=\"Our Zero Trust security checklist will help you self-assess your progress in adopting a Zero Trust security strategy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/\" \/>\n<meta property=\"og:site_name\" content=\"Learning Hub\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-08T11:35:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-25T21:37:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Microsoft Zero Trust Security Checklist\",\"datePublished\":\"2021-10-08T11:35:20+00:00\",\"dateModified\":\"2024-11-25T21:37:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/\"},\"wordCount\":87,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg\",\"articleSection\":[\"Azure\",\"Making Sense of Zero Trust\",\"Making Sense of Zero Trust\",\"Microsoft Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/\",\"name\":\"Microsoft Zero Trust Security Checklist - Learning Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg\",\"datePublished\":\"2021-10-08T11:35:20+00:00\",\"dateModified\":\"2024-11-25T21:37:09+00:00\",\"author\":{\"@id\":\"\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#primaryimage\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg\",\"contentUrl\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/10\\\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg\",\"width\":800,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/zero-trust-security-checklist\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Zero Trust Security Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/#website\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/\",\"name\":\"Learning Hub\",\"description\":\"Cloud Direct\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/clouddirect.net\\\/learning-hub\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Microsoft Zero Trust Security Checklist - Learning Hub","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/","og_locale":"en_GB","og_type":"article","og_title":"Microsoft Zero Trust Security Checklist","og_description":"Our Zero Trust security checklist will help you self-assess your progress in adopting a Zero Trust security strategy.","og_url":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/","og_site_name":"Learning Hub","article_published_time":"2021-10-08T11:35:20+00:00","article_modified_time":"2024-11-25T21:37:09+00:00","og_image":[{"width":800,"height":532,"url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#article","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/"},"author":{"name":"","@id":""},"headline":"Microsoft Zero Trust Security Checklist","datePublished":"2021-10-08T11:35:20+00:00","dateModified":"2024-11-25T21:37:09+00:00","mainEntityOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/"},"wordCount":87,"commentCount":0,"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg","articleSection":["Azure","Making Sense of Zero Trust","Making Sense of Zero Trust","Microsoft Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/","url":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/","name":"Microsoft Zero Trust Security Checklist - Learning Hub","isPartOf":{"@id":"https:\/\/clouddirect.net\/learning-hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#primaryimage"},"image":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#primaryimage"},"thumbnailUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg","datePublished":"2021-10-08T11:35:20+00:00","dateModified":"2024-11-25T21:37:09+00:00","author":{"@id":""},"breadcrumb":{"@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#primaryimage","url":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg","contentUrl":"https:\/\/clouddirect.net\/learning-hub\/wp-content\/uploads\/sites\/2\/2021\/10\/glenn-carstens-peters-RLw-UC03Gwc-unsplash-2048x1363-1-1.jpeg","width":800,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/clouddirect.net\/learning-hub\/zero-trust-security-checklist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/clouddirect.net\/learning-hub\/"},{"@type":"ListItem","position":2,"name":"Microsoft Zero Trust Security Checklist"}]},{"@type":"WebSite","@id":"https:\/\/clouddirect.net\/learning-hub\/#website","url":"https:\/\/clouddirect.net\/learning-hub\/","name":"Learning Hub","description":"Cloud Direct","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/clouddirect.net\/learning-hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"","url":"https:\/\/clouddirect.net\/learning-hub\/author\/"}]}},"_links":{"self":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/618","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/comments?post=618"}],"version-history":[{"count":0,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/posts\/618\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media\/1091"}],"wp:attachment":[{"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/media?parent=618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/categories?post=618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/tags?post=618"},{"taxonomy":"post_media_type","embeddable":true,"href":"https:\/\/clouddirect.net\/learning-hub\/wp-json\/wp\/v2\/post_media_type?post=618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}