Always authenticate and authorize based on all available data points — identity, location, device, service/workload, data classification, and anomalies.
Limit user access with just-in-time (JIT) and just-enough-access (JEA), risk-based adaptive policies, and data protection.
Minimize blast radius, segment access, verify end-to-end encryption, use analytics to get visibility and drive threat detection.
| Pillar | Focus | Key Microsoft Solution |
|---|---|---|
| Identities | Verify with strong authentication, risk-based access | Microsoft Entra ID, ID Protection |
| Endpoints (Devices) | Validate device health and compliance before granting access | Microsoft Intune, Defender for Endpoint |
| Applications | Govern app permissions, shadow IT, in-app privileges | Defender for Cloud Apps, Entra App Proxy |
| Data | Classify, label, and encrypt; protect regardless of location | Microsoft Purview, AIP/MIP sensitivity labels |
| Infrastructure | Assess versions, configurations, and JIT access | Defender for Cloud, Azure Policy |
| Networks | Segment, encrypt, and limit lateral movement | Azure Firewall, NSG, DDoS Protection, WAF |
| Responsibility | On-Premises | IaaS | PaaS | SaaS |
|---|---|---|---|---|
| Physical infrastructure | Customer | Microsoft | Microsoft | Microsoft |
| OS / Runtime | Customer | Customer | Microsoft | Microsoft |
| Network controls | Customer | Customer | Shared | Microsoft |
| Application | Customer | Customer | Customer | Shared |
| Identity & Access | Customer | Customer | Customer | Customer |
| Data | Customer | Customer | Customer | Customer |