Sanjeev Bali, IAM Technical Consultant at CyberRes
Bob Brentson, IAM Practice Principal at CyberRes
Zero Trust has been a buzzword in the cybersecurity space since 2019. The Pandemic made us realize that Zero Trust isn’t just a concept or business jargon, but a prime necessity for every organization. The IT world is moving away from perimeter-centric, network-based security solutions to identity-centric solutions and Zero Trust is at the core of this revolution.
Modern identity governance and administration is a critical pillar to this shift. Models that require schedule-based certifications and re-certifications are no longer helpful for agile business. Industries are looking for a solution that governs and mitigates the risk to their critical assets in real/near-real time—one that follows the principle of continuous monitoring, continuous compliance, continuous authentication verification, and zero time tolerance to access beyond the business needs and least privilege.
Agenda:
Introduction to Identity Governance and Principles of Zero Trust.
User accounts and entitlements are granted through governance-driven provisioning.
Privileged user accounts and entitlements are granted and revoked through governance-driven provisioning.
All access is periodically attested (Reviews and Micro certifications).
User access rights are granted according to the principle of least privilege.
(Agenda # 2-5 will be practically demonstrated in a demo environment.)