Skip to content

Commit 3aae7b5

Browse files
committed
change placement of video
1 parent f26a96b commit 3aae7b5

1 file changed

Lines changed: 4 additions & 4 deletions

File tree

learn-pr/wwl-sci/describe-security-concepts-methodologies/includes/4-describe-zero-trust-model.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,13 @@ Today, work happens from anywhere. Employees use personal and corporate devices,
77

88
Zero Trust addresses this reality by assuming that no network, device, user, or application should be trusted by default, even those that have already authenticated or are connected to a trusted network.
99

10-
## Zero Trust guiding principles
10+
Watch this video to learn about Zero Trust.
1111

12-
The Zero Trust model is built on three guiding principles that shape how security decisions are made in every part of an organization.
12+
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=5881f412-3b50-43dc-9d03-794d4348603b]
1313
14-
This video introduces the Zero Trust methodology:
14+
## Zero Trust guiding principles
1515

16-
> [!VIDEO https://learn-video.azurefd.net/vod/player?id=5881f412-3b50-43dc-9d03-794d4348603b]
16+
The Zero Trust model is built on three guiding principles that shape how security decisions are made in every part of an organization.
1717

1818
- **Verify explicitly**: Always authenticate and authorize based on all available signals, not just a single factor like a password or network location. Signals include the user's identity, their sign-in location, the device they're using and its compliance status, the service or application being accessed, the classification of the data involved, and any anomalies such as unusual sign-in times or locations. The more signals you can evaluate, the more confident you can be that the right person is accessing the right resource.
1919

0 commit comments

Comments
 (0)