Cloud 101CircleEventsBlog
Gain exclusive access to CSA’s extensive network of cloud security experts by becoming a corporate member. Learn how today.

Download Publication

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Who it's for:
  • Technology Providers
  • Technical Directors
  • CISOs, CTOs, CIOs

Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is one of the key principles of zero trust architecture. A ZT approach aims to reduce the success of cyber-attacks and data breaches through risk-based access requirements, that is, by requiring authentication and authorization prior to granting access to resources (data and/or systems).

In order to meet this requirement, it is important to look at both existing and new identity, access management, and cloud solutions with a ZT lens.

ZT is a technology-agnostic guidance framework to bring controls closer to the asset being protected (the protect surface). From an identity and access management perspective, this has the potential to significantly increase the richness of the risk-based decision about granting access and eliminate the granting of access based on the binary trust of a single access control method.
Download this Resource

Bookmark
Share
Related resources
Machine Identity in Cybersecurity and IAM
Machine Identity in Cybersecurity and IAM
Zero Trust Guiding Principles
Zero Trust Guiding Principles
What is IAM for the Cloud?
What is IAM for the Cloud?
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Data Security Platforms: 9 Key Capabilities and Evaluation Criteria
Published: 09/19/2023
IoT Security and the Infinite Game
IoT Security and the Infinite Game
Published: 09/19/2023
Exploring the Intersection of IAM and Generative AI in the Cloud
Exploring the Intersection of IAM and Generative AI in the Cloud
Published: 09/15/2023
Reshaping Security Landscapes: The Essence of Cyber Transformation
Reshaping Security Landscapes: The Essence of Cyber Transformation
Published: 09/15/2023

Acknowledgements

Shruti Kulkarni
Shruti Kulkarni
Cyber Security Architect, 6point6

Shruti Kulkarni

Cyber Security Architect, 6point6

I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and maintenance of ISO27001, PCI-DSS and GDPR, including Greenfield implem...

Read more

Alon Nachmany Headshot Missing
Alon Nachmany

Alon Nachmany

This person does not have a biography listed with CSA.

Jonathan Flack Headshot Missing
Jonathan Flack

Jonathan Flack

This person does not have a biography listed with CSA.

Erik Johnson
Erik Johnson
Cloud Security Specialist & Senior Research Analyst

Erik Johnson

Cloud Security Specialist & Senior Research Analyst

Worked for the Federal Reserve for many years and volunteered with the CSA with a focus on CCM/CAIQ V4, specifically the STA domain, and developing a comprehensive framework and guidance for defining and managing the cloud shared security responsibility model (SSRM).

I recently retired from the Federal Reserve and am now consulting with the CSA as a Senior Research Analyst with a focus on Zero Trust and Financial Services.

Linke...

Read more

Paul Simmonds Headshot Missing
Paul Simmonds

Paul Simmonds

This person does not have a biography listed with CSA.

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training