Beyond IAM: Zero Trust Needs A Second Act in Identity
Zero Trust has become mainstream in security, emphasizing the need for authentication and authorization as pillars of security rather than relying on perimeter-based security models. The "front door" of access is crucial to Zero Trust, with identity being its lifeblood. Common identity tools like IGA and IAM are insufficient to solve the problems of authorization and achieve Zero Trust due to issues such as managing permissions with naming conventions, unique permission languages for each integrated system, narrow targets, unresolved identity errors, slow and expensive integrations, and lack of coverage for service accounts. To get to Zero Trust, a practical solution is needed that provides visibility into end-to-end permissions, meets compliance demands, automates least privilege work, and uses a graph database to manage relationships and paths connecting identities, actions, and resources. Veza's Authorization Graph addresses these challenges by showing the reality of permissions today, connecting to over 60 different systems, and enabling users to find and fix over-permissioning in their environment.
Company
Veza
Date published
March 20, 2023
Author(s)
Rich Dandliker
Word count
1330
Language
English
Hacker News points
None found.