Cyber Magazine July 2023 | Page 54

What is identity and access management ( IAM ) and how to use it

What is identity and access management ( IAM ) and how to use it

WATCH NOW
– to an approach that enforces strict access controls and verification for every user and device , regardless of their location .
In the context of IAM , Zero Trust extends the principle of “ never trust , always verify ” to user identities and their access privileges . It emphasises continuous authentication , authorisation , and validation of users throughout their entire session , rather than relying solely on initial login credentials . By adopting a Zero Trust approach to IAM , organisations can achieve greater granularity and control over access , reducing the risk of unauthorised access or lateral movement within the network .
As explained in a whitepaper by Okta , Zero Trust is not a novel concept or idea .

“ The doors for data and systems to exist anywhere and allow organisations to adopt work-from-anywhere practices also leads to cracks appearing , creating security risks for businesses ”

DENIS DORVAL VP SALES INTERNATIONAL , JUMPCLOUD
54 July 2023