Micro Authorizations: Enabling Zero Trust in PAM

Logo
Presented by

Sara Peck, Demand Generation Lead | John Martinez, Technical Evangelist | strongDM

About this talk

The Authorization Fabric decides whether a specific principal is authorized to perform a precise operation on a particular resource and whether the resource permits this access.The granularity of this approach is vital in today’s threat landscape, requiring organizations to shift their focus to a comprehensive, system-wide authorization framework. This shift parallels the principles of microservices but applies them to the realm of access control. Rather than depending on a single point of control, there is a need for a network proxy that acts as a bridge between trust and authorization. Join us on a journey towards a future powered by micro authorizations, where precision, adaptability, and contextual awareness define access control. Explore how micro authorizations can address contemporary security challenges and facilitate the adoption of the Zero Trust model.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (101)
Subscribers (7489)
This channel brings together the leading identity and security vendors and industry experts to regularly educate security leaders on how to reduce risk through identity-centric strategies. For more resources and education on identity-centric security strategies, visit www.idsalliance.org.