Skip to content

Commit 215a7e4

Browse files
authored
Merge pull request #223992 from batamig/patch-289
suggesting intro text for ZT + Sentinel
2 parents 7f620db + f463e70 commit 215a7e4

File tree

1 file changed

+21
-21
lines changed

1 file changed

+21
-21
lines changed

articles/sentinel/sentinel-solution.md

Lines changed: 21 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
---
2-
title: Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
2+
title: Monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
33
description: Install and learn how to use the Microsoft Sentinel Zero Trust (TIC3.0) solution for an automated visualization of Zero Trust principles, cross-walked to the Trusted Internet Connections framework.
44
ms.date: 01/09/2023
55
ms.service: network-access
@@ -10,28 +10,17 @@ ms.collection:
1010
- zerotrust-services
1111
---
1212

13-
# Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
13+
# Monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
1414

15-
The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** enables governance and compliance teams to design, build, monitor, and respond to Zero Trust (TIC 3.0) requirements. This solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
15+
[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing security principles that assumes breach, and verifies each request as though it originated from an uncontrolled network. A Zero Trust model implements the following security principles:
1616

17-
This article describes how to install and use the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** in your Microsoft Sentinel workspace.
17+
- **Verify explicitly**: Always authenticate and authorize based on all available data points.
18+
- **Use least privilege access**: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
19+
- **Assume breach**: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
1820

19-
While only Microsoft Sentinel is required to get started, the solution is enhanced by integrations with other Microsoft Services, such as:
21+
This article describes how to use the Microsoft Sentinel **Zero Trust (TIC 3.0)** solution, which helps governance and compliance teams monitor and respond to Zero Trust requirements according to the [TRUSTED INTERNET CONNECTIONS (TIC) 3.0](https://www.cisa.gov/tic) initiative.
2022

21-
- [Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
22-
- [Microsoft Information Protection](https://azure.microsoft.com/services/information-protection/)
23-
- [Azure Active Directory](https://azure.microsoft.com/services/active-directory/)
24-
- [Microsoft Defender for Cloud](https://azure.microsoft.com/services/active-directory/)
25-
- [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender)
26-
- [Microsoft Defender for Identity](https://www.microsoft.com/microsoft-365/security/identity-defender)
27-
- [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security)
28-
- [Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/security/office-365-defender)
29-
30-
For more information, see [Guiding principles of Zero Trust](/azure/security/integrated/zero-trust-overview#guiding-principles-of-zero-trust).
31-
32-
> [!NOTE]
33-
> Microsoft Sentinel solutions are sets of bundled content, pre-configured for a specific set of data. For more information, see [Microsoft Sentinel solutions documentation](sentinel-solutions.md).
34-
>
23+
[Microsoft Sentinel solutions](sentinel-solutions.md) are sets of bundled content, pre-configured for a specific set of data. The **Zero Trust (TIC 3.0)** solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
3524

3625
## The Zero Trust solution and the TIC 3.0 framework
3726

@@ -65,6 +54,17 @@ Before installing the **Zero Trust (TIC 3.0)** solution, make sure you have the
6554

6655
- **Required user permissions**. To install the **Zero Trust (TIC 3.0)** solution, you must have access to your Microsoft Sentinel workspace with [Security Reader](../active-directory/roles/permissions-reference.md#security-reader) permissions.
6756

57+
The **Zero Trust (TIC 3.0)** solution is also enhanced by integrations with other Microsoft Services, such as:
58+
59+
- [Microsoft 365 Defender](https://www.microsoft.com/microsoft-365/security/microsoft-365-defender)
60+
- [Microsoft Information Protection](https://azure.microsoft.com/services/information-protection/)
61+
- [Azure Active Directory](https://azure.microsoft.com/services/active-directory/)
62+
- [Microsoft Defender for Cloud](https://azure.microsoft.com/services/active-directory/)
63+
- [Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender)
64+
- [Microsoft Defender for Identity](https://www.microsoft.com/microsoft-365/security/identity-defender)
65+
- [Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security)
66+
- [Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/security/office-365-defender)
67+
6868
## Install the Zero Trust (TIC 3.0) solution
6969

7070
**To deploy the *Zero Trust (TIC 3.0)* solution from the Azure portal**:
@@ -79,7 +79,7 @@ For more information, see [Deploy out-of-the-box content and solutions](sentinel
7979

8080
## Sample usage scenario
8181

82-
The following sections shows how a security operations analyst could use the resources deployed with the **Zero Trust (TIC 3.0)** solution to review requirements, explore queries, configure alerts, and implement automation.
82+
The following sections show how a security operations analyst could use the resources deployed with the **Zero Trust (TIC 3.0)** solution to review requirements, explore queries, configure alerts, and implement automation.
8383

8484
After [installing](#install-the-zero-trust-tic-30-solution) the **Zero Trust (TIC 3.0)** solution, use the workbook, analytics rules, and playbook deployed to your Microsoft Sentinel workspace to manage Zero Trust in your network.
8585

@@ -192,4 +192,4 @@ Read our blogs!
192192
- [Announcing the Microsoft Sentinel: Zero Trust (TIC3.0) Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/announcing-the-microsoft-sentinel-zero-trust-tic3-0-solution/ba-p/3031685)
193193
- [Building and monitoring Zero Trust (TIC 3.0) workloads for federal information systems with Microsoft Sentinel](https://devblogs.microsoft.com/azuregov/building-and-monitoring-zero-trust-tic-3-0-workloads-for-federal-information-systems-with-microsoft-sentinel/)
194194
- [Zero Trust: 7 adoption strategies from security leaders](https://www.microsoft.com/security/blog/2021/03/31/zero-trust-7-adoption-strategies-from-security-leaders/)
195-
- [Implementing Zero Trust with Microsoft Azure: Identity and Access Management (6 Part Series)](https://devblogs.microsoft.com/azuregov/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6/)
195+
- [Implementing Zero Trust with Microsoft Azure: Identity and Access Management (6 Part Series)](https://devblogs.microsoft.com/azuregov/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6/)

0 commit comments

Comments
 (0)