Zero Trust security: the importance of assigning the level of trust to corporate users
The challenge of cybersecurity in the era of mobility and multi-device access
As more devices are used by enterprise users, correctly assigning the level of trust becomes critical. Organizations with a greater focus on cybersecurity use X.509 digital certificates on user devices to create stronger credentials than traditional passwords.
The union between user identity and device identity: a challenge in the enterprise
Marrying user identity and device identity can lead to problems, especially when users use multiple devices. Copying credentials between different devices increases the risk of sensitive data being compromised, and devices may require different credentials depending on their capabilities. This problem is amplified even more in ICT networks with workstations shared by multiple users.
The user's identity: informal and authoritative
There are two types of identity: informal identity, the one with which groups self-define a person's identity based on their appearance and behavior, and authoritative identity, which is assigned by an entity responsible for issuing identity certificates . Government organizations issue identity documents that allow people to interact with private institutions and organizations, representing their identity.
Design a reliable authentication system in a Zero Trust network
When designing a reliable authentication system in a Zero Trust network, it is important to use multiple communication channels to reach users, such as sending one-time codes or push notifications. Additionally, the use of security hardware tokens, such as smart cards or Yubikey, can provide a unique assertion of a user's identity. It is also essential to consider the use of out-of-band authentication, which uses a separate communication channel than the primary channel used by the user to authenticate.
Follow us on Threads for more pills like this09/21/2023 15:39
Marco Verro