Zero Trust for identity and access management
In the previous chapter, you learned about the design for an identity security strategy and how to evaluate a strategy for security operations. Managing and monitoring potential threats and vulnerabilities with security operations is aided by a Zero Trust strategy. This is increasingly true when determining a strategy for recommendations to design a secure identity and access architecture. Let’s review some of the foundational elements of Zero Trust and how they relate to securing identities.
Zero Trust is an integrated approach to securing access with adaptive controls and continuous verification across your entire digital estate. Everything from the user’s identity to the application’s hosting environment verifies the request and prevents a breach. To limit the impact of potential breaches, we apply segmentation policies, employ the principle of least privilege access, and use analytics to help detect and respond...