Zero Trust in Azure: A Practical Starting Point
Zero Trust isn't a product you buy — it's an architecture you build. Here's how I approach it in Microsoft Azure environments, from identity foundations to network segmentation.
Senior Cloud Security & Platform Engineer
I design and build secure, scalable cloud platforms — primarily in Microsoft Azure. I specialise in Zero Trust architecture, Microsoft Defender, Sentinel, and landing zone security. I also write about what I learn here on this blog.
// work
A Terraform-based Azure Landing Zone with opinionated security defaults: Defender for Cloud, Sentinel, Private Endpoints, and Entra ID governance policies baked in from day one.
Conditional Access policy templates for Entra ID covering Privileged Identity Management, device compliance, and location-based access — designed to be used as a starting point for enterprise deployments.
// writing
Zero Trust isn't a product you buy — it's an architecture you build. Here's how I approach it in Microsoft Azure environments, from identity foundations to network segmentation.
Defender for Cloud ships with sensible defaults, but a handful of non-default settings make a dramatic difference to your security posture. Here are the ones I enable on every engagement.
I'm currently open to new senior roles in cloud security and platform engineering. Let's have a conversation.