Develop using Zero Trust principles

Today, organizations need a new security model that effectively adapts to the complexity of the modern environment, embraces the mobile workforce, and protects people, devices, applications, and data wherever they are located.

This is the core of Zero Trust. Instead of believing everything behind the corporate firewall is safe, the Zero Trust model assumes breach and verifies each request as though it originated from an uncontrolled network. Regardless of where the request originates or what resource it accesses, the Zero Trust model teaches us to "never trust, always verify."

Diagram of elements of visibility, automation, and orchestration in Zero Trust.

As a developer, it is essential that you use Zero Trust principles to keep users safe and data secure. The development guidance in this section is organized by technology pillar. Use it to learn how you can leverage Microsoft technology to adopt Zero Trust principles in the apps you develop.