Sign in to confirm you’re not a bot
This helps protect our community. Learn more
Armchair Architects: Zero Trust Architecture (pt 1)
52Likes
1,485Views
Mar 112025
In this episode of the Azure Essentials Show, David, Eric, and Uli— our Armchair Architects—focus on Zero Trust Architecture. Their discussion covers zero trust principles, emphasizing that no user, device, or workload is inherently trusted. The trio highlight identity verification, continuous monitoring, and least privileged access, with practical examples from Microsoft. Join us to explore zero trust architecture and its impact on modern security practices. Be sure to catch part two of their conversation too. Resources • Microsoft Intune https://learn.microsoft.com/mem • Microsoft Entra https://learn.microsoft.com/entra • Azure network security https://learn.microsoft.com/azure/net... • Training: Zero Trust https://learn.microsoft.com/training/... • Training: Microsoft Cybersecurity Architect https://learn.microsoft.com/training/... Connect • Ulrich (Uli) Homann   / ulrichhomann   • Eric Charran   / ericcharran   • David Blank-Edelman   / dnblankedelman   Related episodes • Zero Trust Architecture (part 2) https://aka.ms/AzEssentials/183 • Watch all the Armchair Architects episodes https://aka.ms/ArmchairArchitects Chapters 0:00 Introduction 1:14 ZTA defined 2:03 Example from Microsoft 2:46 Continuous verification 4:39 Use established solutions 5:10 Impacting network performance 5:29 Personal devices 5:58 Everything has an identity 7:49 Pop those trust bubbles 8:35 IP address not enough 9:13 Teeing up part two

Follow along using the transcript.

Microsoft Developer

589K subscribers