ChaptersEventsBlog

Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Released: 07/13/2023

Identity and Access Management

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is one of the key principles of zero trust architecture. A ZT approach aims to reduce the success of cyber-attacks and data breaches through risk-based access requirements, that is, by requiring authentication and authorization prior to granting access to resources (data and/or systems).

In order to meet this requirement, it is important to look at both existing and new identity, access management, and cloud solutions with a ZT lens.

ZT is a technology-agnostic guidance framework to bring controls closer to the asset being protected (the protect surface). From an identity and access management perspective, this has the potential to significantly increase the richness of the risk-based decision about granting access and eliminate the granting of access based on the binary trust of a single access control method.


Best For IconBest For:
  • Technology Providers
  • Technical Directors
  • CISOs, CTOs, CIOs

Partner Event Spotlight

Want to see your content featured here?

Contact us to learn more!

Explore More of CSA

Research & Best Practices

Stay informed about the latest best practices, reports, and solutions in cloud security with CSA research.

Upcoming Events & Conferences

Stay connected with the cloud security community by attending local events, workshops, and global CSA conferences. Engage with industry leaders, gain new insights, and build valuable professional relationships—both virtually and in person.

Training & Certificates

Join the countless professionals who have selected CSA for their training and certification needs.

Industry News

Stay informed with the latest in cloud security news - visit our blog to keep your competitive edge sharp.