General FAQs
What is Zero Trust?
Zero Trust is a security model that assumes breach and explicitly verifies every request as though it originates from an uncontrolled network. The Zero Trust model is based on the principle of “never trust, always verify” and assumes breach. The Zero Trust model is a holistic approach to securing all access across your networks, applications, and environment. The Zero Trust model can be applied to identity, devices, applications, data, infrastructure, and networks.
How does the Microsoft Zero Trust Workshop align with NIST?
The Zero Trust Workshop aligns with Microsoft's Zero Trust Architecture, which aligns with NIST. One of the main drivers of this workshop was looking at how our Microsoft product landscape maps across the entire NIST architecture.
What permissions do I need for the Microsoft Zero Trust Assessment?
The app requires read-only permissions to read your tenant configuration. See the App Permissions page for more details.
Is this an official Microsoft product?
No. It is a community project that is maintained by Microsoft employees. The app is provided as-is and is not supported through any Microsoft support program or service. Please do not contact Microsoft support with any issues or concerns.
How do I get support?
Please raise an issue on the Zero Trust Assessment GitHub repo.