Share these talks and lectures with your colleagues
Invite colleaguesWhy policy-based authorisation is critical for identity-first security
Abstract
The enterprise perimeter is changing; it is now about data objects, application programming interfaces (APIs), microservices and applications. In this evolving, decentralised and highly segmented world, security and identity access management (IAM) leaders find themselves struggling with a security methodology to address their concerns — specifically to answer the very basic question: Who has access to what and when? Identity-first security is emerging as the most effective way to answer these concerns, by placing identity at the centre of the security design. This paper will cover the ‘why’ of identity-first security, what is important to know and consider, and then the ‘how’ it can be achieved. The paper argues for this methodology and presents detailed flow of why modernised policy-based authorisation is crucial for identity-first security. The paper is directed to security and IAM professionals and leaders who want to learn more about how security and identity are tightly coupled and the way to get there with policy-based authorisations.
The full article is available to subscribers to the journal.
Author's Biography
Gal Helemski is a recognised specialist in cyber security with specific focus on identity and access management. In the past 25 years she has defined solutions to customers, written project specs, technical documentation, presentations and training. Eight years ago, she co-founded PlainID, a leader in authorisation management and control. Gal holds a BSc in physics and computer science from Bar-Ilan University. In the Israel Defence Forces (IDF), she served for six years in the Center of Computing and Information Systems (Mamram).