Sanjeev Bali, IAM Technical Consultant at CyberRes
Bob Brentson, IAM Practice Principal at CyberRes
Zero Trust has been a buzzword in the cybersecurity space since 2019. The Pandemic made us realize that Zero Trust isn’t just a concept or business jargon, but a prime necessity for every organization. The IT world is moving away from perimeter-centric, network-based security solutions to identity-centric solutions and Zero Trust is at the core of this revolution.
Modern identity governance and administration is a critical pillar to this shift. Models that require schedule-based certifications and re-certifications are no longer helpful for agile business. Industries are looking for a solution that governs and mitigates the risk to their critical assets in real/near-real time—one that follows the principle of continuous monitoring, continuous compliance, continuous authentication verification, and zero time tolerance to access beyond the business needs and least privilege.
Introduction to Identity Governance and Principles of Zero Trust.
User accounts and entitlements are granted through governance-driven provisioning.
Privileged user accounts and entitlements are granted and revoked through governance-driven provisioning.
All access is periodically attested (Reviews and Micro certifications).
User access rights are granted according to the principle of least privilege.
(Agenda # 2-5 will be practically demonstrated in a demo environment.)