Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. Instead, people are the new perimeter, and identity is the core for maintaining a secure environment.
8. PROTECTION
A D O P T I O N
• Active Directory on-
premises
• No cloud integration
• Passwords everywhere
• Single sign-on across
employees,
contractors, partners
• Modern multi-factor
authentication
• Unified policies across
apps and servers
• Context-based access
policies
• Multiple factors deployed
across user groups
• Automated
deprovisioning for
leavers
• Secure access to APIs
• Risk-based access
policies
• Continuous and
adaptive
authentication and
authorization
• Frictionless access
Stage 1:
Fragmented
identity
Zero Trust Maturity Curve
Stage 2:
Unified IAM
Stage 3:
Contextual
Access
Stage 4:
Adaptive
Workforce
the old way assumes a trusted network protected by the network perimeter
And an untrusted network outside the perimeter where the bad guys live.
This security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet
As modern organizations adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce
Effectively there is no longer a “perimeter” around your sensitive assets
Employees, contractors, partners, suppliers all accessing that data from across the traditional perimeter, representing potential threats.
The result is that you can no longer assume trust across any part of the IT stack
Policy enforcement done at logical perimeter
“resources = logical perimeter”?
Logical vs physical perimter
Any other thoughts for the “least friction possible” treatment?
Zero Trust starts with identity and identity starts with Okta
Okta is the foundation of a Zero Trust ecosystem
Okta is a strategic leader in Zero Trust