CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◆ Security Tools & Reviews Apr 06, 2026

The Zero Trust Workshop -- Your Free Nitro-Boosted Cybersecurity Strategy - virtualizationreview.com

virtualizationreview.com Archived Apr 06, 2026 ✓ Full text saved

The Zero Trust Workshop -- Your Free Nitro-Boosted Cybersecurity Strategy virtualizationreview.com

Full text archived locally
✦ AI Summary · Claude Sonnet


    Skip to main content Add as a preferred source on Google HOME PAPERS WEBCASTS NEWSLETTERS ADVERTISE TRAINING SUMMITS MORE CLOUDEDGE & AICONTAINERS/KUBERNETESEND USER COMPUTING & DAASNETWORKING & SECURITYVIRTUALIZATION PLATFORMSBACKUP & DATA RESILIENCE IN-DEPTH The Zero Trust Workshop -- Your Free Nitro-Boosted Cybersecurity Strategy Paul Schnackenburg, our 1-person SOC from Down Under, explains in detail how the Zero Trust workshop guide, workbook, and assessment tool turn principles into a practical roadmap for staged adoption across people, process, and technology. By Paul Schnackenburg02/09/2026 Key Takeaways Zero Trust is a program of cultural, strategic, and technical change -- not a single product. The workshop guide and workbook provide a structured roadmap across the six Zero Trust pillars. The Zero Trust Assessment PowerShell module inventories tenant settings and highlights remediation priorities. The consensus among cybersecurity professionals is that a Zero Trust-based cybersecurity strategy is the best approach, and many pundits, including myself, have been banging that drum for years now. But the big question everyone has is how do you actually "do Zero Trust?" Where do you start? You cannot buy an application or a service, turn it on and "have Zero Trust" (notwithstanding nearly every cybersecurity vendor slapping Zero Trust stickers on their wares, but of course those stickers have now been replaced with "Agentic AI powered"). There are cultural, strategic and structural changes required, as well as tactical configurations across the board, so it's overwhelming to even know where to start, let alone have a map to continue going. Turns out Microsoft offers a free workshop guide, and a couple of tools that help answer those questions, handy both for partner organizations helping their clients, and for businesses themselves as they're adopting Zero Trust. To be completely accurate, these tools are maintained as free open source by several Microsoft employees, but it's not an official tool that you can call Microsoft support about if you're having issues. This article will look at Zero Trust at a high level, the challenges of actually making it real in an organization, how to use the tools Microsoft provides, and how to use the workshop guidance to improve cybersecurity. Zero Trust -- Should that Be 'Trust After verification?' I've heard many people say, particularly from the academic world, that Zero Trust is a negative term and puts people off, and I can understand that. What it actually means is that implicit trust is dangerous, and trust can only be earned after explicit verification. As an example, in the "old world" your laptop was automatically trusted if it was on the local area network. No matter if it had been compromised and was running malware, or if the user account using it had been compromised by an attacker who was using this beachhead to attack other systems. It was a trusted corporate laptop, on a trusted network and thus OK, and that implicit trust is dangerous and will lead to compromise. If on the other hand we verify explicitly, the laptop is checked for its current cybersecurity posture, and only after found to be acceptable is access granted, ditto for the user account. Microsoft lists three principles for Zero Trust: Verify explicitly Assume breach Least privilege access Across six pillars: Identity Endpoints Applications Network Infrastructure Data In other words, for identity, endpoints etc. every connection should be explicitly verified and permissions granted should be the minimum any application or user needs to do their work, no more. This access needs to be verified over time -- Entra calls this Access Reviews. And rather than expecting that your defenses will keep the bad guys out, design your systems assuming that they're already in there, by compartmentalizing areas so that a breach doesn't automatically grant access to everyone and everything, plus make sure you have telemetry to spot intrusions when they do happen. The Open Group offers a vendor-neutral approach, and they list 13 commandments, across four areas: Practice Deliberate Security Secure Assets by Risk Validate Trust Explicitly Support Business Objectives Enable Modern Work Implement Asset-Centric Controls Enable Sustainable Security Develop a Security-Centric Culture Practice Accountability Enable Pervasive Security Utilize Least Privilege Deploy Simple Security Deploy Agile and Adaptive Security Make Informed Decisions Improve and Evolve Security Controls Utilize Defense in Depth Enable Resiliency As you can see, the challenge with infusing Zero Trust into a company's culture isn't (just) about technical controls and "nerd stuff," it heavily involves those two other cornerstones -- people and process . Building a culture around that in an organization is the real challenge. The question still remains -- how do you actually implement these principles / commandments in a business? What configuration steps do you start with? The Zero Trust Workshop Version 2 The first version of this workshop was created to help answer the most common question Microsoft's clients had -- "I understand about Zero Trust, but I don't know how to implement it." This new version (I was lucky enough to be part of the private preview testing of it) is more comprehensive and comes with a built-in tool to evaluate the current configuration of a tenant. Access the workshop guide here and the workbook here. Yes, you read that right, it's an Excel workbook, which isn't as crazy as it sounds. It helps you keep track of each pillar (they each have a spreadsheet tab in the workbook), and lays out logical "swim lanes" of steps to follow. The second tool is a PowerShell script that inventories your current security posture across several areas of Entra ID & Microsoft 365 -- more about this below. It's called a workshop because it's meant to be delivered as a series of meetings where each individual tile is discussed, and progress is tracked over time. The workshop can be used by an internal IT department, or if a Microsoft partner is delivering it with their client (the guide for customizing the branding of the sheet is here). The accompanying documentation is comprehensive, and there's also a video covering each of the workshop pillars. To make it real, here's a portion of the Identity Roadmap sheet in the workbook: [Click on image for larger view.] Zero Trust Workbook - Identity Roadmap The first part of this pillar is Design a Conditional Access (CA) posture, and under the Access area swim-lane, there are six tiles to attend to. It starts with CA policies for Authentication Strength, then policies for device state and app management, followed by policies with risk controls. Each tile lets you know the implementation effort (High, Medium and Low), the user impact and also has a hyperlink directly to the relevant portion of the workshop documentation. This documentation has an overview paragraph, followed by links to the relevant technical documentation. Each step has a drop-down to track progress: [Click on image for larger view.] Zero Trust Workbook - Progress Tracking Apart from the obvious In planning, Planned, In progress etc. there's Blocked, First Party other or Third Party. If there's a technical reason you can't roll this out now, you're blocked, if the control is satisfied by another Microsoft technology it is first party and if you're using some other vendor's technology to fulfil this criterion, it's Third Party. Another handy tip is using the Note functionality in Excel to add comments to each Tile as you work through it with the relevant stakeholders. Each spreadsheet also has a single tile at the start of each swim lane to do first, then one or more in the "then" phase, followed by one or more in the "next" phase -- clearly conveying priorities. The Identity Roadmap has over 30 swim lanes covering everything from "Stop buying or building Active Directory dependent apps" through "Develop credential (incl. Passwordless) strategy" to "Rollout Privileged Identity Management for Tier-Zero roles". The Devices Roadmap covers Mobile Application Management, MDM for iOS & Android, Windows, MacOS and more. The Data Roadmap is a bit shorter (but will probably take longer to implement in the real world), and looks at discovering and protecting your data, managing access to it, and protecting critical data assets. In the Network Roadmap you'll look at modernizing VPN and protecting legacy apps, securing access to all internet resources plus network application protection and control. The Infrastructure Roadmap on the other hand has many areas for governance, compliance, servers, containers, storage, databases, APIs and infrastructure services. 1 2 next » Recommended: Solving VMware Backup Challenges with the Cloud Featured KubeCon 2026 EU Final Day Recap -- The Evolution and Future of Kubernetes KubeCon 2026 EU Day 2 Recap -- Digital Sovereignty and Real-life Experiences with Kubernetes KubeCon 2026 EU Day 1 Recap -- The World's Largest Open-Source Meet Up Subscribe on YouTube Most Popular Articles KubeCon 2026 EU Day 1 Recap -- The World's Largest Open-Source Meet Up KubeCon 2026 EU Final Day Recap -- The Evolution and Future of Kubernetes NVIDIA, AWS and Google Cloud Spotlight AI Infrastructure Push at GTC 2026 KubeCon 2026 EU Pre-event Recap Sovereign Cloud: Microsoft's Answer to Geopolitical Uncertainty Upcoming Training Events Live! 360 6-Week Training & Certification Course: Mastering the Microsoft AI Framework: Building Enterprise-Ready AI Agents with Microsoft Foundry March 10-April 14, 2026 Live! 360 2-Day Hands-On Seminar: Copilot Studio, Microsoft Agent Framework and Foundry: Building Multi-Agent AI Systems June 8-9, 2026 Live! 360 2-Day Hands-On Seminar: AI-Powered .NET Development with Claude & Claude Code July 9-10, 2026 VSLive! 4-Day Hands-On Training Seminar: Immersive .NET Full Stack Training with CoPilot: 4-Day Hands-On Experience July 14-17, 2026 Visual Studio Live! @ Microsoft HQ July 27-31, 2026 Visual Studio Live! @ San Diego September 14-18, 2026 The AI Pivot September 25, 2026 Live! 360 6-Week Training & Certification Course: Mastering the Microsoft AI Framework: Building Enterprise-Ready AI Agents with Microsoft Foundry October 6–November 10, 2026 Live! 360 Orlando November 15-20, 2026 Artificial Intelligence Live! Orlando November 15-20, 2026 AI Enterprise Architecture Live! Orlando November 15-20, 2026 Cybersecurity & Ransomware Live! Orlando November 15-20, 2026 Data Platform Live! Orlando November 15-20, 2026 Visual Studio Live! Orlando November 15-20, 2026 VSLive! 4-Day Hands-On Training Seminar: Immersive .NET Full Stack Training with CoPilot: 4-Day Hands-On Experience December 15-18, 2026 Free White Papers State of platform engineering in the age of AI Red Hat Trusted Software Supply Chain AI-assisted app dev for the enterprise 6 considerations for choosing a modern application platform More Tech Library Sponsored Webcasts Splunk Enterprise Security Unmasked: Cybersecurity Insights From the Shadows Defending What Matters in SLED: A Candid Conversation on Cyber Resilience Beyond Backup: Building True Cloud Cyber Resilience with Rubrik Top 5 Advantages of Cloud Virtualization: Agility for Supply-Constrained Markets More Webcasts This website uses cookies to enhance user experience and to analyze performance and traffic on our website. We also share information about your use of our site with our social media, advertising and analytics partners. Do Not Sell My Personal Information Do Not Sell My Personal Information Your Privacy Strictly Necessary Cookies Functional Cookies Performance Cookies Sale of Personal Data Your Privacy When you visit our website, we store cookies on your browser to collect information. The information collected might relate to you, your preferences or your device, and is mostly used to make the site work as you expect it to and to provide a more personalized web experience. However, you can choose not to allow certain types of cookies, which may impact your experience of the site and the services we are able to offer. Click on the different category headings to find out more and change our default settings according to your preference. You cannot opt-out of our First Party Strictly Necessary Cookies as they are deployed in order to ensure the proper functioning of our website (such as prompting the cookie banner and remembering your settings, to log into your account, to redirect you when you log out, etc.). For more information about the First and Third Party Cookies used please follow this link. More information Strictly Necessary Cookies Always Active These cookies are necessary for the website to function and cannot be switched off in our systems. They are usually only set in response to actions made by you which amount to a request for services, such as setting your privacy preferences, logging in or filling in forms. You can set your browser to block or alert you about these cookies, but some parts of the site will not then work. These cookies do not store any personally identifiable information. Functional Cookies Functional Cookies Active These cookies enable the website to provide enhanced functionality and personalisation. They may be set by us or by third party providers whose services we have added to our pages. If you do not allow these cookies then some or all of these services may not function properly. Performance Cookies Performance Cookies Active These cookies allow us to count visits and traffic sources so we can measure and improve the performance of our site. They help us to know which pages are the most and least popular and see how visitors move around the site. All information these cookies collect is aggregated and therefore anonymous. If you do not allow these cookies we will not know when you have visited our site, and will not be able to monitor its performance. Sale of Personal Data Sale of Personal Data Active As a consumer, you have the right to opt-out from the sale or sharing of your personal information at any time across business platform, services, businesses and devices. You can opt-out of the sale and sharing of your personal information by using this toggle switch. As a California, Virginia, Utah, Colorado and Connecticut consumer, you have the right to opt-out from the sale of your personal data and the processing of your personal data for targeted advertising. You can opt-out of the sale of your personal data and targeted advertising by using this toggle switch. For more information on your rights as a United States consumer see our privacy notice. Targeting Cookies Switch Label label These cookies may be set through our site by our advertising partners. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. If you do not allow these cookies, you will experience less targeted advertising. Cookie List Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Allow All
    💬 Team Notes
    Article Info
    Source
    virtualizationreview.com
    Category
    ◆ Security Tools & Reviews
    Published
    Apr 06, 2026
    Archived
    Apr 06, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗