MFA enabled tenant-wide but Conditional Access not risk-based. Intune partial; device compliance not enforced for all corporate access. Network: traditional perimeter with VPN, microsegmentation absent. Data classification minimal — Purview Information Protection in pilot at best. Apps not gated by Conditional Access. No single Zero Trust programme; pillars owned (or not owned) by separate teams.
Typical concerns
- ·No defensible answer to "what is your Zero Trust posture?"
- ·Conditional Access exists but does not enforce device compliance
- ·Network perimeter still load-bearing in the security model
- ·Sensitive data scattered without classification or DLP
- ·Pillars without explicit owners; no programme cadence
Capability gaps
- ·Identity pillar with risk-based Conditional Access and PIM
- ·Device pillar with Intune compliance enforcement
- ·Network pillar with microsegmentation or ZTNA
- ·Data pillar with sensitivity labels and DLP
- ·App pillar with Conditional Access gating
- ·Programme cadence with explicit pillar owners