/plushcap/analysis/veza/beyond-iam-zero-trust-needs-a-second-act-in-identity

Beyond IAM: Zero Trust Needs A Second Act in Identity

What's this blog post about?

Zero Trust has become mainstream in security, emphasizing the need for authentication and authorization as pillars of security rather than relying on perimeter-based security models. The "front door" of access is crucial to Zero Trust, with identity being its lifeblood. Common identity tools like IGA and IAM are insufficient to solve the problems of authorization and achieve Zero Trust due to issues such as managing permissions with naming conventions, unique permission languages for each integrated system, narrow targets, unresolved identity errors, slow and expensive integrations, and lack of coverage for service accounts. To get to Zero Trust, a practical solution is needed that provides visibility into end-to-end permissions, meets compliance demands, automates least privilege work, and uses a graph database to manage relationships and paths connecting identities, actions, and resources. Veza's Authorization Graph addresses these challenges by showing the reality of permissions today, connecting to over 60 different systems, and enabling users to find and fix over-permissioning in their environment.

Company
Veza

Date published
March 20, 2023

Author(s)
Rich Dandliker

Word count
1330

Language
English

Hacker News points
None found.


By Matt Makai. 2021-2024.