You are on page 1of 28

Authentication is the first step to

Zero Trust
Presented by

Debanjali Ghosh

Technical Evangelist,
ManageEngine
The post-pandemic challenges in cybersecurity

Zero Trust Architecture - What, Why and How


Agenda
Authentication - The first leap to Zero Trust
Key topics covered
in this presentation IAM and Zero Trust: A compatible duo

Checklist for evaluating IAM solutions


Post-pandemic challenges to
cybersecurity
What to be wary of?

Absence of well-defined
perimeters

Due to hybrid work, there is a lack


of geographically-defined
perimeter.
Post-pandemic challenges to
cybersecurity
What to be wary of?

Absence of well-defined Shadow IT


perimeters

Due to hybrid work, there is a lack Policies like BYOD have led to an
of geographically-defined increased number of unauthorized
perimeter. devices.
Post-pandemic challenges to
cybersecurity
What to be wary of?

Absence of well-defined Shadow IT Lack of network visibility


perimeters

Systems and platforms keep the


company organized and on track to
Due to hybrid work, there is a lack Policies like BYOD have led to an
achieving business goals.
of geographically-defined increased number of unauthorized
perimeter. devices.
MITIGATING THE POST-PANDEMIC
CYBERSECURITY CONCERNS
• The rise of hybrid workforce model

• Verifying and monitoring of a mixed bag of endpoint devices - An IT admin challenge

• Continuous investment in cybersecurity and security technology

• The need for an inclusive approach to cybersecurity

• Zero Trust Network Architecture — A necessity


Never trust, always verify

Principles of Zero
Trust
Never trust, always verify

Principles of Zero Least privilege access

Trust
Never trust, always verify

Principles of Zero Least privilege access

Trust
Continuous monitoring
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.

Secures hybrid
ecosystems
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.

Secures hybrid Fine-grained enterprise


ecosystems visibility
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.

Secures hybrid Fine-grained enterprise Timely incident


ecosystems visibility response
Why Zero Trust?
It's distinct edge over existing cybersecurity systems.

Secures hybrid Fine-grained enterprise Timely incident Minimizing privileged


ecosystems visibility response abuse
Components of Zero Trust
The three key logical structures, as per NIST guidelines.

Policy Engine
Components of Zero Trust
The three key logical structures, as per NIST guidelines.

Policy Engine Policy Administrator


Components of Zero Trust
The three key logical structures, as per NIST guidelines.

Policy Engine Policy Administrator Policy Enforcement Point


Authentication: The first leap
to Zero Trust
• Authentication is the fundamental part of every cybersecurity strategy.

• Hybrid networks - minimal network visibility and lack of organized device management

• Device and human frailties add up to the weakest links of a supply chain.

• Authentication - Must have a no one-size-fits-all approach


IAM and Zero Trust: A compatible
duo
• Zero Trust can only be built upon centralized access policies and regulations.

• IAM = Context aware evaluation + access control policies

• IAM authenticates, authorizes and governs the entities connected to an organizational network.

• IAM authentication makes optimal use of the zero-trust verification factors.

• Zero Trust and IAM — A secure way forward


With the right IAM strategy in place, Zero Trust
can efficiently implement hyper specific access
control policies.
Checklist for
evaluating IAM
solutions
1

Adaptive
Authentication

Checklist for
evaluating IAM
solutions
1 2

Adaptive Pre-authentication
Authentication risk profile

Checklist for
evaluating IAM
solutions
1 2

Adaptive Pre-authentication
Authentication risk profile

Checklist for
evaluating IAM
solutions 3

Multi-factor
authentication
1 2

Adaptive Pre-authentication
Authentication risk profile

Checklist for
evaluating IAM
solutions 3 4

Multi-factor Single Sign-on


authentication
Contextual decision making

How IAM aids a


frictionless ZT Leveraging federated identity

Foolproof security and seamless user


experience

Personalized credentials
Contextual decision making

How IAM aids a


frictionless ZT Leveraging federated identity

Foolproof security and seamless user


experience

Personalized credentials
For Zero Trust to be the all-seeing-eye that governs
these wider range of components within a network,
IAM holds the key to create, catalog and maintain their
identity profiles.
debs@manageengine.com
Any questions?

Write to me for consultation. I hope you learned something new.

You might also like