You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/sentinel-solution.md
+21-21Lines changed: 21 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,5 @@
1
1
---
2
-
title: Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
2
+
title: Monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
3
3
description: Install and learn how to use the Microsoft Sentinel Zero Trust (TIC3.0) solution for an automated visualization of Zero Trust principles, cross-walked to the Trusted Internet Connections framework.
4
4
ms.date: 01/09/2023
5
5
ms.service: network-access
@@ -10,28 +10,17 @@ ms.collection:
10
10
- zerotrust-services
11
11
---
12
12
13
-
# Build and monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
13
+
# Monitor Zero Trust (TIC 3.0) security architectures with Microsoft Sentinel
14
14
15
-
The Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** enables governance and compliance teams to design, build, monitor, and respond to Zero Trust (TIC 3.0) requirements. This solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
15
+
[Zero Trust](/security/zero-trust/zero-trust-overview) is a security strategy for designing and implementing security principles that assumes breach, and verifies each request as though it originated from an uncontrolled network. A Zero Trust model implements the following security principles:
16
16
17
-
This article describes how to install and use the Microsoft Sentinel solution for **Zero Trust (TIC 3.0)** in your Microsoft Sentinel workspace.
17
+
-**Verify explicitly**: Always authenticate and authorize based on all available data points.
18
+
-**Use least privilege access**: Limit user access with Just-In-Time and Just-Enough-Access (JIT/JEA), risk-based adaptive policies, and data protection.
19
+
-**Assume breach**: Minimize blast radius and segment access. Verify end-to-end encryption and use analytics to get visibility, drive threat detection, and improve defenses.
18
20
19
-
While only Microsoft Sentinel is required to get started, the solution is enhanced by integrations with other Microsoft Services, such as:
21
+
This article describes how to use the Microsoft Sentinel **Zero Trust (TIC 3.0)** solution, which helps governance and compliance teams monitor and respond to Zero Trust requirements according to the [TRUSTED INTERNET CONNECTIONS (TIC) 3.0](https://www.cisa.gov/tic) initiative.
-[Microsoft Information Protection](https://azure.microsoft.com/services/information-protection/)
23
-
-[Azure Active Directory](https://azure.microsoft.com/services/active-directory/)
24
-
-[Microsoft Defender for Cloud](https://azure.microsoft.com/services/active-directory/)
25
-
-[Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender)
26
-
-[Microsoft Defender for Identity](https://www.microsoft.com/microsoft-365/security/identity-defender)
27
-
-[Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security)
28
-
-[Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/security/office-365-defender)
29
-
30
-
For more information, see [Guiding principles of Zero Trust](/azure/security/integrated/zero-trust-overview#guiding-principles-of-zero-trust).
31
-
32
-
> [!NOTE]
33
-
> Microsoft Sentinel solutions are sets of bundled content, pre-configured for a specific set of data. For more information, see [Microsoft Sentinel solutions documentation](sentinel-solutions.md).
34
-
>
23
+
[Microsoft Sentinel solutions](sentinel-solutions.md) are sets of bundled content, pre-configured for a specific set of data. The **Zero Trust (TIC 3.0)** solution includes a workbook, analytics rules, and a playbook, which provide an automated visualization of Zero Trust principles, cross-walked to the Trust Internet Connections framework, helping organizations to monitor configurations over time.
35
24
36
25
## The Zero Trust solution and the TIC 3.0 framework
37
26
@@ -65,6 +54,17 @@ Before installing the **Zero Trust (TIC 3.0)** solution, make sure you have the
65
54
66
55
-**Required user permissions**. To install the **Zero Trust (TIC 3.0)** solution, you must have access to your Microsoft Sentinel workspace with [Security Reader](../active-directory/roles/permissions-reference.md#security-reader) permissions.
67
56
57
+
The **Zero Trust (TIC 3.0)** solution is also enhanced by integrations with other Microsoft Services, such as:
-[Microsoft Information Protection](https://azure.microsoft.com/services/information-protection/)
61
+
-[Azure Active Directory](https://azure.microsoft.com/services/active-directory/)
62
+
-[Microsoft Defender for Cloud](https://azure.microsoft.com/services/active-directory/)
63
+
-[Microsoft Defender for Endpoint](https://www.microsoft.com/microsoft-365/security/endpoint-defender)
64
+
-[Microsoft Defender for Identity](https://www.microsoft.com/microsoft-365/security/identity-defender)
65
+
-[Microsoft Defender for Cloud Apps](https://www.microsoft.com/microsoft-365/enterprise-mobility-security/cloud-app-security)
66
+
-[Microsoft Defender for Office 365](https://www.microsoft.com/microsoft-365/security/office-365-defender)
67
+
68
68
## Install the Zero Trust (TIC 3.0) solution
69
69
70
70
**To deploy the *Zero Trust (TIC 3.0)* solution from the Azure portal**:
@@ -79,7 +79,7 @@ For more information, see [Deploy out-of-the-box content and solutions](sentinel
79
79
80
80
## Sample usage scenario
81
81
82
-
The following sections shows how a security operations analyst could use the resources deployed with the **Zero Trust (TIC 3.0)** solution to review requirements, explore queries, configure alerts, and implement automation.
82
+
The following sections show how a security operations analyst could use the resources deployed with the **Zero Trust (TIC 3.0)** solution to review requirements, explore queries, configure alerts, and implement automation.
83
83
84
84
After [installing](#install-the-zero-trust-tic-30-solution) the **Zero Trust (TIC 3.0)** solution, use the workbook, analytics rules, and playbook deployed to your Microsoft Sentinel workspace to manage Zero Trust in your network.
85
85
@@ -192,4 +192,4 @@ Read our blogs!
192
192
-[Announcing the Microsoft Sentinel: Zero Trust (TIC3.0) Solution](https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/announcing-the-microsoft-sentinel-zero-trust-tic3-0-solution/ba-p/3031685)
193
193
-[Building and monitoring Zero Trust (TIC 3.0) workloads for federal information systems with Microsoft Sentinel](https://devblogs.microsoft.com/azuregov/building-and-monitoring-zero-trust-tic-3-0-workloads-for-federal-information-systems-with-microsoft-sentinel/)
194
194
-[Zero Trust: 7 adoption strategies from security leaders](https://www.microsoft.com/security/blog/2021/03/31/zero-trust-7-adoption-strategies-from-security-leaders/)
195
-
-[Implementing Zero Trust with Microsoft Azure: Identity and Access Management (6 Part Series)](https://devblogs.microsoft.com/azuregov/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6/)
195
+
-[Implementing Zero Trust with Microsoft Azure: Identity and Access Management (6 Part Series)](https://devblogs.microsoft.com/azuregov/implementing-zero-trust-with-microsoft-azure-identity-and-access-management-1-of-6/)
0 commit comments