ChaptersEventsBlog
How is your enterprise using AI Agents? Help us benchmark security and take the survey before November 30 →

Download Publication

Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Zero Trust Principles and Guidance for Identity and Access Management (IAM)
Who it's for:
  • Technology Providers
  • Technical Directors
  • CISOs, CTOs, CIOs

Zero Trust Principles and Guidance for Identity and Access Management (IAM)

Release Date: 07/13/2023

Identity and the ability to consume information about that identity as well as other Zero Trust (ZT) signals (additional attributes about an identity), is one of the key principles of zero trust architecture. A ZT approach aims to reduce the success of cyber-attacks and data breaches through risk-based access requirements, that is, by requiring authentication and authorization prior to granting access to resources (data and/or systems).

In order to meet this requirement, it is important to look at both existing and new identity, access management, and cloud solutions with a ZT lens.

ZT is a technology-agnostic guidance framework to bring controls closer to the asset being protected (the protect surface). From an identity and access management perspective, this has the potential to significantly increase the richness of the risk-based decision about granting access and eliminate the granting of access based on the binary trust of a single access control method.
Download this Resource

Bookmark
Share
Related resources
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Korean Translation
Zero Trust Guidance for Small and Medium Size B...
Securing Application-to-Application Traffic with AI/AGI/ML-Powered Virtual Firewalls: A Comprehensive Framework for Multi-Cloud, Hybrid, and On-Premises Environments
Securing Application-to-Application Traffic with AI/AGI/ML-Powered ...
Published: 11/21/2025
It’s Time to Make Cloud Threat Modeling Continuous
It’s Time to Make Cloud Threat Modeling Continuous
Published: 11/20/2025
SSCF v1.0: The Standard That Simplifies SaaS Security
SSCF v1.0: The Standard That Simplifies SaaS Security
Published: 11/19/2025
The 99% Solution: MFA for Hypervisor Security
The 99% Solution: MFA for Hypervisor Security
Published: 11/18/2025
Beyond Passwords: FIDO's Authentication Vision for Financial Services in the Cloud Era
Beyond Passwords: FIDO's Authentication Vision for Financial Servic...
December 12 | Virtual

Interested in helping develop research with CSA?

Related Certificates & Training