Case Study

Adopting a Zero Trust approach to Identity in line - of - business applications

Adopting a Zero Trust approach to Identity in line - of - business applications

Pages 3 Pages

Adopting a Zero Trust approach to Identity in line-of-business applications This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. © 2022 Microsoft. All rights reserved. App developers can adopt the Zero Trust principles of verify explicitly, use least privileged access, and assume breach to improve app security and ensure apps are ready to be deployed securely in modern work environments. This guidance is for using a Zero Trust approach to Identity in line-of-business applications. These apps are developed by or specifically for an organization for use by employees as part of their day-to-day work. The guidance here explains our recommendations that are specific to th

Join for free to read