{"id":35531,"date":"2020-06-15T20:45:23","date_gmt":"2020-06-15T20:45:23","guid":{"rendered":"https:\/\/www.microsoft.com\/security\/blog\/?p=91227"},"modified":"2020-06-15T20:45:23","modified_gmt":"2020-06-15T20:45:23","slug":"zero-trust-part-1-networking","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/","title":{"rendered":"Zero Trust\u2014Part 1: Networking"},"content":{"rendered":"<p>Enterprises used to be able to secure their corporate perimeters with traditional network controls and feel confident that they were keeping hackers out. However, in a mobile- and cloud-first world, in which the rate and the sophistication level of security attacks are increasing, they can no longer rely on this approach. Taking a Zero Trust approach can help to ensure optimal security without compromising end user application experiences.<\/p>\n<p>Microsoft has a long history of working with customers on how to protect against a broad range of security attacks and we are one of the largest producers of threat intelligence built on the variety of data that flows through our network.<\/p>\n<p>Today, I\u2019d like to share how you can be successful implementing the Zero Trust model by rethinking your network strategy. Here\u2019s a video that will give you a quick overview:<\/p>\n<p>Over a series of three blogs (of which this is the first), we will take a deeper dive into the aspects of the <strong>Networking<\/strong> pillar in the Microsoft Zero Trust security model. We will go through each of the dimensions listed (<em>network segmentation, threat protection, and encryption<\/em>) and show design patterns and helpful guidance on using Microsoft Azure services to achieve optimality.<\/p>\n<p>As mentioned in our <a href=\"https:\/\/microsoft-my.sharepoint.com\/personal\/v-dabada_microsoft_com\/Documents\/Security%20stuff\/Template\/aka.ms\/ZTmodel\" target=\"_blank\" rel=\"noopener noreferrer\">Maturity Model paper<\/a>, all data is ultimately accessed over network infrastructure. Networking controls can provide critical \u201cin pipe\u201d controls to enhance visibility and help prevent attackers from moving laterally across the network. Networks should be segmented (including deep in network micro-segmentation) and real-time threat protection, end-to-end encryption, monitoring, and analytics should be employed.<\/p>\n<h3>Maturity model<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91231\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1-1024x252.png\" alt=\"Maturity model.\" width=\"1024\" height=\"252\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1-1024x252.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1-300x74.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1-768x189.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1-1536x378.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-1.png 1804w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<p>We will go over the first one, <em>network segmentation<\/em>, in this blog. One thing to keep in mind is that while moving straight from the traditional stage to optimal is ideal, most organizations will need to take a phased approach that generally follows along the maturity model journey.<\/p>\n<h3>The need for network segmentation<\/h3>\n<p>If you refer to the three core principles (Verify Explicitly, Use Least Privilege Access, and Assume Breach), a Zero Trust approach encourages you to think that a security incident can happen anytime and you are always under attack. One of the things you want to be ready with is a setup that minimizes the blast radius of such an incident\u2014this is where segmenting your network while you design its layout becomes important. In addition, by implementing these software-defined perimeters with increasingly granular controls, you will increase the \u201ccost\u201d to attackers to propagate through your network and thereby dramatically reduce the lateral movement of threats.<\/p>\n<h3>Network segmentation in Azure<\/h3>\n<p>When you operate on Azure, you have a wide and diverse set of segmentation controls available to help create isolated environments. Here are the five basic controls that you can use to perform network segmentation in Azure:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-91232\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2-1024x419.png\" alt=\"Network segmentation in Azure\" width=\"1024\" height=\"419\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2-1024x419.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2-300x123.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2-768x315.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2-1536x629.png 1536w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-2.png 1814w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<h3>Segmentation patterns<\/h3>\n<p>There are three common segmentation patterns when it comes to organizing your workload in Azure:<\/p>\n<ol>\n<li>Single Virtual Network<\/li>\n<li>Multiple Virtual Networks with peering<\/li>\n<li>Multiple Virtual Networks in hub-and-spoke model<\/li>\n<\/ol>\n<p>Each of these provide a different type of isolation and connectivity. As to which one works best for your organization is a planning decision based on your organization\u2019s needs. Here\u2019s where you can read about <a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/architecture\/reference-architectures\/hybrid-networking\/network-level-segmentation\" target=\"_blank\" rel=\"noopener noreferrer\">Segmenting Virtual Networks<\/a> in more detail and learn how each of these models can be done using Azure Networking services.<\/p>\n<h3>The internet boundary<\/h3>\n<p>Whether you are building a modern application in the cloud or you just migrated a set of applications to Azure, most applications require some ability to send and receive data to\/from the public internet. Any time you expose a resource to a network you increase threat risk, and with internet exposure this is further compounded by a large set of possible threats.<\/p>\n<p>The recommended approach in Azure is to use <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/ddos-protection\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure DDoS Protection Service<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/azure-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Firewall<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/web-application-firewall\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Web Application Firewall<\/a> to provide comprehensive threat protection. This setup of having an internet boundary using these services is important in a segmentation architecture since it essentially segments your application stack away from the internet while providing carefully inspected traffic to\/from it.<\/p>\n<h3>The datacenter or on-premises network boundary<\/h3>\n<p>In addition to internet connectivity, your application stack on Azure might need connectivity back to your IT footprint in your on-premises datacenter(s) and\/or other public clouds. You have multiple options to achieve that: you can choose to have direct connectivity using <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/expressroute\/\" target=\"_blank\" rel=\"noopener noreferrer\">Express Route<\/a>, use our <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/vpn-gateway\/\" target=\"_blank\" rel=\"noopener noreferrer\">VPN Gateway<\/a>, or have a more unified distributed connectivity experience using <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/virtual-wan\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Virtual WAN<\/a>. The same concept of segmenting away your application stack applies here, so that any threats that might affect your datacenter or on-premises network will have a harder time propagating to your cloud platform (and vice-versa).<strong>&nbsp;<\/strong><\/p>\n<h3>The PaaS services boundary<\/h3>\n<p>As with most modern applications, chances are that your application will be using one of the many platform-as-a-service (PaaS) offerings available on Azure. Some examples of PaaS services you may want your application to call into include <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/storage\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure Storage<\/a>, <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/sql-database\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure SQL Database<\/a>, and <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/key-vault\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure KeyVault<\/a>. These are segmented away from your workload in an Azure virtual network since they run as a separate service built and operated by Azure.<\/p>\n<p>On top of this built-in segmentation of PaaS services, Azure also makes it possible for you to do all your interactions with these services in the private address space using <a href=\"https:\/\/azure.microsoft.com\/en-us\/services\/private-link\/\" target=\"_blank\" rel=\"noopener noreferrer\">Azure PrivateLink<\/a>. This connectivity capability ensures that all your interactions with PrivateLink-enabled PaaS services are done securely and all data exchanged remains in the Microsoft Network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-91233 size-large\" src=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-3-1024x743.png\" alt=\"The PaaS services boundary.\" width=\"1024\" height=\"743\" srcset=\"https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-3-1024x743.png 1024w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-3-300x218.png 300w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-3-768x557.png 768w, https:\/\/www.microsoft.com\/security\/blog\/wp-content\/uploads\/2020\/06\/Zero-Trust-Network-3.png 1357w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><\/p>\n<h3>In closing<\/h3>\n<p>Networking represents a great opportunity to make meaningful headway in your Zero Trust journey. Your Zero Trust efforts will not only help your security posture, but most efforts will also help you modernize your environment and improve organizational productivity. In this blog, we discussed how you can use networking services from Azure to build three types of segmentation patterns. In future blogs, we will dive deeper into how you can do the same for threat protection and encryption, the other two dimensions in the networking pillar described in our <a href=\"https:\/\/go.microsoft.com\/fwlink\/p\/?linkid=2109181\" target=\"_blank\" rel=\"noopener noreferrer\">Zero Trust vision paper<\/a>. In the meantime, we also invite you to <a href=\"https:\/\/myignite.techcommunity.microsoft.com\/sessions\/81969?source=sessions\" target=\"_blank\" rel=\"noopener noreferrer\">watch our Ignite session<\/a> to get additional information about network security offerings from Azure.<\/p>\n<p>Make sure to check out the other deployment guides in the series by following the <a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft Security blog<\/a>. For more information on Microsoft Security solutions,&nbsp;<a href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/solutions\" target=\"_blank\" rel=\"noopener noreferrer\">visit our website<\/a>. Bookmark the&nbsp;<a href=\"https:\/\/www.microsoft.com\/security\/blog\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security blog<\/a>&nbsp;to keep up with our expert coverage on security matters. Also, follow us at&nbsp;<a href=\"https:\/\/twitter.com\/MSFTSecurity\" target=\"_blank\" rel=\"noopener noreferrer\">@MSFTSecurity<\/a>&nbsp;for the latest news and updates on cybersecurity.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/06\/15\/zero-trust-part-1-networking\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking a Zero Trust approach can help to ensure optimal security without compromising end user application experiences.<br \/>\nThe post Zero Trust\u2014Part 1: Networking appeared first on Microsoft Security. READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":35532,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[276],"tags":[6578,3677],"class_list":["post-35531","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-microsoft-secure","tag-threat-protection","tag-zero-trust"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-15T20:45:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"252\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Zero Trust\u2014Part 1: Networking\",\"datePublished\":\"2020-06-15T20:45:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/\"},\"wordCount\":1091,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-trust-part-1-networking.png\",\"keywords\":[\"Threat protection\",\"Zero Trust\"],\"articleSection\":[\"Microsoft Secure\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/\",\"name\":\"Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-trust-part-1-networking.png\",\"datePublished\":\"2020-06-15T20:45:23+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-trust-part-1-networking.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/06\\\/zero-trust-part-1-networking.png\",\"width\":1024,\"height\":252},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/zero-trust-part-1-networking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Threat protection\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/threat-protection\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Zero Trust\u2014Part 1: Networking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/","og_locale":"en_US","og_type":"article","og_title":"Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-06-15T20:45:23+00:00","og_image":[{"width":1024,"height":252,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Zero Trust\u2014Part 1: Networking","datePublished":"2020-06-15T20:45:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/"},"wordCount":1091,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png","keywords":["Threat protection","Zero Trust"],"articleSection":["Microsoft Secure"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/","url":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/","name":"Zero Trust\u2014Part 1: Networking 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png","datePublished":"2020-06-15T20:45:23+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/06\/zero-trust-part-1-networking.png","width":1024,"height":252},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/zero-trust-part-1-networking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Threat protection","item":"https:\/\/www.threatshub.org\/blog\/tag\/threat-protection\/"},{"@type":"ListItem","position":3,"name":"Zero Trust\u2014Part 1: Networking"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=35531"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/35531\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/35532"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=35531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=35531"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=35531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}