Skip to content

Commit 3a46c01

Browse files
Merge pull request #54153 from ceperezb/CEPEREZB-sc900-describe-security-concepts
change placement of video
2 parents 4bf8743 + 3aae7b5 commit 3a46c01

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

learn-pr/wwl-sci/describe-security-concepts-methodologies/includes/4-describe-zero-trust-model.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ Today, work happens from anywhere. Employees use personal and corporate devices,
77

88
Zero Trust addresses this reality by assuming that no network, device, user, or application should be trusted by default, even those that have already authenticated or are connected to a trusted network.
99

10-
## Zero Trust guiding principles
10+
Watch this video to learn about Zero Trust.
1111

12-
The Zero Trust model is built on three guiding principles that shape how security decisions are made in every part of an organization.
12+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=5881f412-3b50-43dc-9d03-794d4348603b]
1313
14-
This video introduces the Zero Trust methodology:
14+
## Zero Trust guiding principles
1515

16-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=5881f412-3b50-43dc-9d03-794d4348603b]
16+
The Zero Trust model is built on three guiding principles that shape how security decisions are made in every part of an organization.
1717

1818
- **Verify explicitly**: Always authenticate and authorize based on all available signals, not just a single factor like a password or network location. Signals include the user's identity, their sign-in location, the device they're using and its compliance status, the service or application being accessed, the classification of the data involved, and any anomalies such as unusual sign-in times or locations. The more signals you can evaluate, the more confident you can be that the right person is accessing the right resource.
1919

0 commit comments

Comments
 (0)