SC‑300 Study Portal Path 1

Unit 3: Explore Zero Trust with Identity

Organizations today have hybrid environments, mobile users, and cloud apps.

The Zero Trust model helps secure this dynamic landscape by continuously validating

users and devices.

Zero Trust Principles

Principle Description Example

Verify

explicitly Validate every access attempt using

multiple data points. Check user identity, device health,

and location before login.

Use least

privilege

access Limit user access to only what’s

required, using JIT (Just-In-Time) or JEA

(Just-Enough-Access). An admin gets elevated privileges

only for 30 minutes to perform a

specific task.

Assume

breach Design systems as though they are

already compromised. Use segmentation, encryption,

and analytics to detect and

contain threats.

Deploying Zero Trust

Zero Trust applies across six pillars:

1. Identity.

2. Endpoints.

3. Data.

4. Applications.

5. Infrastructure.

6. Network.

Each pillar both provides signals and is protected by Zero Trust policies.

Example Scenario:

A salesperson uses their laptop (endpoint) to access CRM data (app/data). The system

checks their Entra ID credentials, device compliance, and location before granting access.

Zero Trust Architecture

 Central Policy Engine: Makes access decisions dynamically.

 Identity and Access Management: Verifies users and devices explicitly using risk

signals.

 Information Protection: Enforces access control and data encryption in real-time.

 SIEM and XDR Integration: Combines threat detection, alerts, and automated

response.

Goal: Ensure only the right people access the right resources, at the right time, from secure

devices.