#ZeroTrustNetworkAccess

ThatNateGuy :verified:thatnateguy@infosec.exchange
2024-01-12

@moses It's essentially a "network on top of a network." It's a virtual or logical network created on top of an existing physical network infrastructure. Imagine it like laying a transparent sheet over your existing network and defining new connections and rules on that sheet. This allows you to create separate, independent virtual networks, even though they share the same physical hardware. This adds flexibility, scalability, security, isolation, and resource optimization. My understanding is that's easier to implement #zerotrustnetworkaccess this way.

I hope that's helpful!

2023-08-28

𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗘𝗻𝘁𝗿𝗮 𝗣𝗿𝗶𝘃𝗮𝘁𝗲 𝗔𝗰𝗰𝗲𝘀𝘀: 𝗔𝗻 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆-𝗖𝗲𝗻𝘁𝗿𝗶𝗰 𝗭𝗲𝗿𝗼 𝗧𝗿𝘂𝘀𝘁 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗔𝗰𝗰𝗲𝘀𝘀 𝗦𝗼𝗹𝘂𝘁𝗶𝗼𝗻

Private Access in Microsoft's SSE solution offers secure, controlled access to private resources using Zero Trust principles, expanded from the existing Entra ID Application Proxy. It supports a range of protocols, authentication methods, and anomaly detection, all benefiting from Microsoft's extensive global network.

Find out more info:

techcommunity.microsoft.com/t5

Here's a summarized breakdown of the provided information:

1️⃣Private Access in Microsoft's SSE Solution:

✔️Built on Zero Trust principles.

✔️Verifies every user and enforces least privilege.

✔️Grants access only to needed private applications and resources.

2️⃣Expansion of Entra ID Application Proxy:

✔️Private Access extends capabilities of Entra ID Application Proxy in Microsoft Entra.

✔️Evolves into a comprehensive Zero Trust Network Access (ZTNA) solution.

✔️Shares connectors but offers expanded functionalities.

3️⃣Access to Any Private Resource:

✔️Simplifies and secures access to private resources on any port and protocol.

✔️Policies enable secure, segmented, and granular access to corporate network apps.

✔️Covers on-premises, cloud-based applications, and more.

4️⃣Granular Access Controls and Anomaly Detection:

✔️Conditional Access policies offer per-app, least privilege controls.

✔️Contextual information about users, devices, and locations enhances policies.

✔️Anomalies or changes trigger session termination or stronger authentication.

5️⃣Secure Access Across Ports and Protocols:

✔️Private Access enables secure entry to applications, regardless of location.

✔️Works with various protocols, including RDP, SSH, SMB, FTP, TCP, and UDP.

6️⃣Diverse Authentication Methods:

✔️Supports single sign-on (SSO) via SAML, http headers, or legacy Kerberos.

✔️No need for application modifications.

7️⃣Microsoft's Global Network Advantage:

✔️Private Access utilizes Microsoft's vast global network for delivery.

✔️Enhanced security and faster access compared to traditional VPNs.

✔️Optimized connection for hybrid and remote work scenarios.

#microsoft #entra #sse #ZTNA #ZeroTrustNetworkAccess #ZeroTrust #sso #saml #mfa #conditionalaccess #azuread #securityserviceedge #vpn #azure #cloud #cloudsecurity

Parliamo di news! ☑️parliamodinews@masthead.social
2022-11-15
2020-09-07

How Zero Trust and SASE Can Redefine Network Defenses for Remote Workforces - The SASE model for remote access and security coupled with Zero Trust can help redefine network an... threatpost.com/how-zero-trust- #secureaccessserviceedge #zerotrustnetworkaccess #perimetersecurity #vulnerabilities #infosecinsider #zerotrust #gartner #sd-wan #sase #cdn

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst