{"title":"Redefining identity-first security with observability","authors":"Wade Ellery","doi":"10.12968/s1361-3723(23)70052-3","DOIUrl":null,"url":null,"abstract":"An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70052-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.