https://store-images.s-microsoft.com/image/apps.50589.493f8103-10fb-4ae8-9e82-3af64a8570a5.d381067c-765c-4506-a17a-46bbf07660a4.8e272ed1-ead5-4e5e-bb09-fce3b1012dd2

Roadmap to Zero Trust: 4 Weeks Assessment

Devoteam M Cloud

Assess and mature your security posture in the modern workplace using the Zero Trust security model

Our pod of 650+ consultants will use a risk-driven approach, infusing cybersecurity and business resilience into every facet of your ecosystem to help you mature your security posture in your Microsoft 365 modern workplace and draw the roadmap towards a Zero Trust model. The engagement will have 3 steps, resulting in a final Zero-Trust-roadmap:

Step 1 – Kick-off: Devoteam will align with all stakeholders to explain the goals and the approach of the exercise. Our Security consultant will present an overview of Zero-trust to ensure common understanding of the methodology. In this workshop we’re also interested to get feedback about your business goals and needs in order to maximize the value of the outcome of the assessment. The result of the workshop is to agree on the overall scope and expectations of all parties involved.

Step 2 – Discovery & Gap Analysis: During the discovery phase, we review the environment based on architectural documents, policies, processes as well as interviews with several key IT staff within your organization. The goal is to identify which assets are critical and to review the current technical setup. After the discovery, a deep dive comparison aligned with the Zero-trust strategy will bring up a list of gaps and areas of improvement

Day 3 – Compliance definition: After analyzing the collected data, we provide you relevant and contextualized recommendations and an action plan to improve your security posture, leveraging as much as possible the existing tools and technologies. We also help you to identify the key benefits which can be communicated to your management to support the migration to the zero-trust model.

The outcome will be a roadmap with a list of immediate activities to perform on Microsoft 365 and quick wins; a list of activities to cover critical risks, planned for execution within 5 months and a list of activities to improve overall cyber security maturity.

At a glance

https://store-images.s-microsoft.com/image/apps.59650.493f8103-10fb-4ae8-9e82-3af64a8570a5.d381067c-765c-4506-a17a-46bbf07660a4.e287774c-76ec-473b-a8e7-8eb3460267ca