Zero Trust security: the importance of assigning the level of trust to corporate users
The challenge of cybersecurity in the era of mobility and multi-device access
The article discusses the importance of correctly assigning trust levels in corporate devices to ensure greater cybersecurity. We also talk about the challenges in identifying the user and the device used, and recommend reliable authentication methods, such as the use of digital certificates and hardware tokens. It highlights the importance of a Zero Trust network and the need to use multiple communication channels to reach users.
As more devices are used by enterprise users, correctly assigning the level of trust becomes critical. Organizations with a greater focus on cybersecurity use X.509 digital certificates on user devices to create stronger credentials than traditional passwords.
The union between user identity and device identity: a challenge in the enterprise
Marrying user identity and device identity can lead to problems, especially when users use multiple devices. Copying credentials between different devices increases the risk of sensitive data being compromised, and devices may require different credentials depending on their capabilities. This problem is amplified even more in ICT networks with workstations shared by multiple users.
The user's identity: informal and authoritative
There are two types of identity: informal identity, the one with which groups self-define a person's identity based on their appearance and behavior, and authoritative identity, which is assigned by an entity responsible for issuing identity certificates . Government organizations issue identity documents that allow people to interact with private institutions and organizations, representing their identity.
Design a reliable authentication system in a Zero Trust network
When designing a reliable authentication system in a Zero Trust network, it is important to use multiple communication channels to reach users, such as sending one-time codes or push notifications. Additionally, the use of security hardware tokens, such as smart cards or Yubikey, can provide a unique assertion of a user's identity. It is also essential to consider the use of out-of-band authentication, which uses a separate communication channel than the primary channel used by the user to authenticate.
Follow us on Google News for more pills like this09/21/2023 15:39
Editorial AI