Identity’s Role in your
Zero Trust strategy
© Okta and/or its affiliates. All rights reserved. Okta Confidential 2
Network Perimeter
TRUSTED UNTRUSTED
The Old Approach to Security Relies on the Network Perimeter
© Okta and/or its affiliates. All rights reserved. Okta Confidential 3
RESOURCES
Infrastructure
IaaS On Prem Servers
Applications
Cloud apps On Prem Apps
APIs
Public Private
Mobile and Cloud Have Dissolved the
Traditional Perimeter
Result: We can no longer assume trust
PEOPLE
Employees Privileged Users Contractors Partners Customers
© Okta and/or its affiliates. All rights reserved. Okta Confidential 4
RESOURCES
Infrastructure
IaaS On Prem Servers
Applications
Cloud apps On Prem Apps
APIs
Public Private
PEOPLE
Employees Privileged Users Contractors Partners Customers
People Are the New Perimeter
Contextual Access
© Okta and/or its affiliates. All rights reserved. Okta Confidential 5
When People are the Perimeter,
Identity Becomes the Foundation
of a Zero Trust Strategy
© Okta and/or its affiliates. All rights reserved. Okta Confidential 6
Contextual Access Management
Network Context
New IP
Specified IP Zones
Network anonymizers
Device Context
New device
Managed device
Location Context
New city/state/country
New geo-location
Impossible travel
App Context
User Context
Contextual Response
Prompt for 2nd factor
Allow/deny access
The
right
people
that is
assessed
continuousl
y
have the
right level of
access
to the
right
resources
in the
right
context
Modern Access Management
Least Friction Possible
PROTECTION
A D O P T I O N
‱ Active Directory on-
premises
‱ No cloud integration
‱ Passwords everywhere
‱ Single sign-on across
employees,
contractors, partners
‱ Modern multi-factor
authentication
‱ Unified policies across
apps and servers
‱ Context-based access
policies
‱ Multiple factors deployed
across user groups
‱ Automated
deprovisioning for
leavers
‱ Secure access to APIs
‱ Risk-based access
policies
‱ Continuous and
adaptive
authentication and
authorization
‱ Frictionless access
Stage 1:
Fragmented
identity
Zero Trust Maturity Curve
Stage 2:
Unified IAM
Stage 3:
Contextual
Access
Stage 4:
Adaptive
Workforce
© Okta and/or its affiliates. All rights reserved. Okta Confidential 9
The Zero Trust
journey starts
with Identity
There’s no silver
bullet for Zero
Trust
Okta is the
modern Zero
Trust Platform
© Okta and/or its affiliates. All rights reserved. Okta Confidential 10
The Zero Trust
journey starts
with Identity
There’s no silver
bullet for Zero
Trust
Okta is the
modern Zero
Trust Platform
“Okta was the foundation that could help us
mature to a zero trust model.”
-Melody Hildebrandt, Global CISO, 21st Century Fox

Identity's Role in a Zero Trust Strategy

  • 1.
    Identity’s Role inyour Zero Trust strategy
  • 2.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 2 Network Perimeter TRUSTED UNTRUSTED The Old Approach to Security Relies on the Network Perimeter
  • 3.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 3 RESOURCES Infrastructure IaaS On Prem Servers Applications Cloud apps On Prem Apps APIs Public Private Mobile and Cloud Have Dissolved the Traditional Perimeter Result: We can no longer assume trust PEOPLE Employees Privileged Users Contractors Partners Customers
  • 4.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 4 RESOURCES Infrastructure IaaS On Prem Servers Applications Cloud apps On Prem Apps APIs Public Private PEOPLE Employees Privileged Users Contractors Partners Customers People Are the New Perimeter Contextual Access
  • 5.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 5 When People are the Perimeter, Identity Becomes the Foundation of a Zero Trust Strategy
  • 6.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 6 Contextual Access Management Network Context New IP Specified IP Zones Network anonymizers Device Context New device Managed device Location Context New city/state/country New geo-location Impossible travel App Context User Context Contextual Response Prompt for 2nd factor Allow/deny access
  • 7.
    The right people that is assessed continuousl y have the rightlevel of access to the right resources in the right context Modern Access Management Least Friction Possible
  • 8.
    PROTECTION A D OP T I O N ‱ Active Directory on- premises ‱ No cloud integration ‱ Passwords everywhere ‱ Single sign-on across employees, contractors, partners ‱ Modern multi-factor authentication ‱ Unified policies across apps and servers ‱ Context-based access policies ‱ Multiple factors deployed across user groups ‱ Automated deprovisioning for leavers ‱ Secure access to APIs ‱ Risk-based access policies ‱ Continuous and adaptive authentication and authorization ‱ Frictionless access Stage 1: Fragmented identity Zero Trust Maturity Curve Stage 2: Unified IAM Stage 3: Contextual Access Stage 4: Adaptive Workforce
  • 9.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 9 The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform
  • 10.
    © Okta and/orits affiliates. All rights reserved. Okta Confidential 10 The Zero Trust journey starts with Identity There’s no silver bullet for Zero Trust Okta is the modern Zero Trust Platform “Okta was the foundation that could help us mature to a zero trust model.” -Melody Hildebrandt, Global CISO, 21st Century Fox

Editor's Notes

  • #3  the old way assumes a trusted network protected by the network perimeter And an untrusted network outside the perimeter where the bad guys live. This security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet
  • #4  As modern organizations adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce Effectively there is no longer a “perimeter” around your sensitive assets Employees, contractors, partners, suppliers all accessing that data from across the traditional perimeter, representing potential threats. The result is that you can no longer assume trust across any part of the IT stack
  • #5 Policy enforcement done at logical perimeter “resources = logical perimeter”?
  • #6 Logical vs physical perimter
  • #8 Any other thoughts for the “least friction possible” treatment?
  • #12 Zero Trust starts with identity and identity starts with Okta Okta is the foundation of a Zero Trust ecosystem Okta is a strategic leader in Zero Trust