Top Banner
ZERO TRUST IDENTITY
11

ZERO TRUST IDENTITY - Bringing Identity

Mar 14, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ZERO TRUST IDENTITY - Bringing Identity

ZERO TRUST IDENTITY

Page 2: ZERO TRUST IDENTITY - Bringing Identity

Identity is the Center of Security– The Future is Now!– Zero Trust Identity

• Users Data, and Devices are uniquely tied together

• Users and devices are untrustworthy

Page 3: ZERO TRUST IDENTITY - Bringing Identity

SESSIONSTime Session Partners

2:30 Access Management Verifies Enterprise Mobility Management Status of Mobile Device

Ping / Vmware

3:00 Complete Security for your AWS deployment Okta / Netskope / LogRhythm / CyberArk

3:30 Adaptive Access Management for Enterprises SecureAuth / Netskope / LogRhythm

4:00 Delegation of Access Management and trust elevation for privileged access

Gemalto / Ping / BeyondTrust

4:30 Access Management checks for Cloud Access Security Broker

Ping / Netskope / Optiv

5:00 Identity Governance Attestation of Privileged Account Management

SailPoint / CyberArk / LogRhythm

Page 4: ZERO TRUST IDENTITY - Bringing Identity

• Problem – Provide secure access to resources based on the

managed status of a mobile device and whether it has been compromised.

• Zero Trust Capabilities– Never trust the user, verify that the user passes

multiple authentication steps and is using a managed, non compromised device.

– Limit Privileges

• IDSA Use Cases– Access Management Verifies Enterprise Mobility

Management Status of Mobile Device

VERIFY THE USER, VERIFY THE DEVICE

Page 5: ZERO TRUST IDENTITY - Bringing Identity

ARCHITECTURE SLIDE

Page 6: ZERO TRUST IDENTITY - Bringing Identity

DEMO FLOW• User attempts to access application from mobile device

• Ping checks for authentication, sends user to VMWare to check on mobile device status

• If enrolled, Ping authenticates

• If not enrolled, Ping performs MFA, sends user back to enroll, and then authenticates

Page 7: ZERO TRUST IDENTITY - Bringing Identity

+

AccessManagement

Identity Governance

Identity Administration

SIEM

EMMDLP

CASBPAM

GRC

Network Security

UEBA

Service Mgmt

Fraud & RiskDAG

IDENTITY SECURITY

Access Management Verifies EMM Status of Mobile Device

Page 8: ZERO TRUST IDENTITY - Bringing Identity

DEMO

Page 9: ZERO TRUST IDENTITY - Bringing Identity

QUESTIONS

Page 10: ZERO TRUST IDENTITY - Bringing Identity

MEMBERS

Page 11: ZERO TRUST IDENTITY - Bringing Identity

THANK YOU

For more information https://www.idsalliance.org