Cloud 101CircleEventsBlog

Download Publication

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Who it's for:
  • Technology Providers
  • Technical Directors
  • CISOs, CTOs, CIOs

Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is one of the key principles of zero trust architecture. A ZT approach aims to reduce the success of cyber-attacks and data breaches through risk-based access requirements, that is, by requiring authentication and authorization prior to granting access to resources (data and/or systems).

In order to meet this requirement, it is important to look at both existing and new identity, access management, and cloud solutions with a ZT lens.

ZT is a technology-agnostic guidance framework to bring controls closer to the asset being protected (the protect surface). From an identity and access management perspective, this has the potential to significantly increase the richness of the risk-based decision about granting access and eliminate the granting of access based on the binary trust of a single access control method.
Download this Resource

Bookmark
Share
Related resources
Map the Transaction Flows for Zero Trust
Map the Transaction Flows for Zero Trust
Top Concerns With Vulnerability Data
Top Concerns With Vulnerability Data
Using Asymmetric Cryptography to Help Achieve Zero Trust Objectives
Using Asymmetric Cryptography to Help Achieve Z...
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
What 2024’s SaaS Breaches Mean for 2025 Cybersecurity
Published: 12/03/2024
Legacy MFT Solutions Might Not Look Broken, But They Are
Legacy MFT Solutions Might Not Look Broken, But They Are
Published: 12/03/2024
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Defining Identities, Accounts, and the Challenge of Privilege Sprawl
Published: 12/02/2024
Readiness Assessments: A Crucial Part of Your SOC Engagement
Readiness Assessments: A Crucial Part of Your SOC Engagement
Published: 12/02/2024

Acknowledgements

Shruti Kulkarni
Shruti Kulkarni
Information Security Architect, Elexon

Shruti Kulkarni

Information Security Architect, Elexon

I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...

Read more

Alon Nachmany
Alon Nachmany

Alon Nachmany

Alon Nachmany is a highly accomplished cybersecurity professional with over 20 years of experience in the industry. He is recognized as a thought leader in the field and has been named one of the top 40 under 40 in cybersecurity by Top Cyber News Magazine. Additionally, Alon serves as a Board Member for multiple organizations.

Throughout his career, Alon has led teams and delivered global safeguards to Fortune 100 partners across a wi...

Read more

Jonathan Flack Headshot Missing
Jonathan Flack
Principal Architect, Cloud & Security Architecture. Under contract to the Department of the Air Force

Jonathan Flack

Principal Architect, Cloud & Security Architecture. Under contract to the Department of the Air Force

Jonathan Flack is a 30 year veteran engineer with extensive expertise in large scale distributed systems and security, serving in Principal or Executive roles. In addition to retaining hands on keyboard with his team, notable areas of focus include NIST 800-63, NIST 800-218 and NIST 800-207 (Zero Trust), software supply chain, and various governance compliance regimes. Recent work includes direct collaboration with the US Department of Defe...

Read more

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst, CSA

Erik Johnson

Cloud Security Specialist & Senior Research Analyst, CSA

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Paul Simmonds
Paul Simmonds
CEO at Global Identity Foundation & Board Member of CSA UK Chapter

Paul Simmonds

CEO at Global Identity Foundation & Board Member of CSA UK Chapter

Paul is the CEO of the Global Identity Foundation and formerly the global CISO of AstraZeneca, ICI and prior to that Motorola Cellular Infrastructure. He is twice listed as one of Network World’s “most powerful people in networking”. He is a director of the Cloud Security Alliance (Europe), co-founded the Jericho Forum, and sits on the advisory boards of a number of global tech companies.

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training