Identity-Centric Strategy
You’ll remember that one of the Cybersecurity Usual Suspects is weak, leaked, and stolen credentials. Credentials and the assets that they protect have been a currency for attackers for decades. Many people reuse passwords across applications, systems, and services. When one of those is compromised and the credentials are stolen, attackers immediately try those credentials on other systems and services across the internet, such as major online banking portals, e-commerce sites, social networks, and so on. The industry has long wanted to deprecate passwords in favor of better authentication methods and use data from authentication and authorization systems to make better resource access decisions. These concepts are central to the Identity-Centric Strategy.
Although the concept of identity and proving your identity is ancient, the Identity-Centric Strategy is a relatively new strategy that gained popularity rapidly. The idea behind this strategy...