Protect data across your files and content, as well as structured and unstructured data wherever it resides, with the Zero Trust security model. As always, the approach applies the principles of verify explicitly, least privileged access, and assume breach. Jeremy Chapman, Director of Microsoft 365, highlights how you can apply Zero Trust security to keep your data protected.
With Zero Trust, protections are designed to follow your data wherever it resides, whether that’s in your infrastructure or in the services that you manage. Protections continue as data flows and people work together with sensitive information. Information can also be protected from leaks by people inside of your organization or from people who should not have access. With the right protections in place, you can protect data if your devices are infected with malware, and you can also block and prevent data access in the case of a data breach. The good news is you can extend protections at a granular level, from your databases and individual data fields, to sensitive words within your databases, and trigger words while using apps.
Steps to protect your data:
Identify top sensitive information
Apply labels and classifiers
Apply principle of least privilege and assume breach
► QUICK LINKS:
00:00 – Introduction
01:36 – Identify your sensitive data
03:55 – Data classification
06:51 – Take action: Least privilege and assume breach
07:22 – See an example
07:54 – Insider risk management capabilities
09:20 – Wrap up
► Link References:
Watch our previous deep dive shows across the layers of Zero Trust at
For more on Zero Trust, go to
► Unfamiliar with Microsoft Mechanics?
We are Microsoft’s official video series for IT. You can watch and share valuable content and demos of current and upcoming tech from the people who build it at #Microsoft.
Subscribe to our YouTube:
Join us on the Microsoft Tech Community:
Watch or listen via podcast here:
► Keep getting this insider knowledge, join us on social:
Follow us on Twitter:
Follow us on LinkedIn: /