Cyber Bites

Zero Trust 1/4: Users

A Zero Trust approach considers users, endpoints, software, and networks as potential threats until proven otherwise. This post covers users.

 

Do you know who your users are? Can you evidence it? Identity Management is key within zero trust architecture as it ensures that users are who they say they are and provides permission to access private data.

 

Software tools like Multifactor Authentication (MFA) Identity Provider (IDP) and Single Sign-On (SSO) allow for the verification of a user ID and assessment against cybersecurity controls and policies before access rights are granted. Continual reassessment of trust makes sure that users (employees, partners, vendors, and clients) are authorized and provided least privilege access to systems. Verify first, then trust.