The Road to Zero Trust Goes Through Authorization
At the recent Gartner Identity & Access Management Summit, the analysts presented the top trends for the identity and access management (IAM) market in the year ahead. One of these trends was a significant increase in the adoption of runtime authorization. The next step in IAM maturity, after authentication, runtime authorization involves a decision made in real-time to permit or deny access to a particular asset or dataset. By leveraging real-time context from signals or attributes, which might include geography, role, level of risk, and more, the permit/deny decision is continuous as well as contextual, which is central to a Zero Trust strategy that the authorization engine derives via attributes.
In this article on Brilliance Security Magazine, Axiomatics’ Chief Product Officer Mark Cassetta talks about the core principles enterprises can look to in an effort to identify and implement effective attribute-based access control (ABAC) at runtime and jump-start their Zero Trust initiatives.
Axiomatics is the originator and leading provider of runtime, fine-grained authorization delivered with attribute-based access control (ABAC) for applications, data, APIs, and microservices. The company’s Orchestrated Authorization strategy enables enterprises to effectively and efficiently connect Axiomatics’ award-winning authorization platform to critical security implementations, such as Zero Trust or identity-first security. The world’s largest enterprises and government agencies continually depend on Axiomatics’ award-winning authorization platform to share sensitive, valuable, and regulated digital assets – but only to authorized users and in the right context. Please visit our website or follow us on LinkedIn, Twitter, and YouTube to learn more.
Corporate Communications Manager