{"title":"用可观察性重新定义身份优先安全","authors":"Wade Ellery","doi":"10.12968/s1361-3723(23)70052-3","DOIUrl":null,"url":null,"abstract":"An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.","PeriodicalId":503952,"journal":{"name":"Computer Fraud & Security","volume":"24 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Redefining identity-first security with observability\",\"authors\":\"Wade Ellery\",\"doi\":\"10.12968/s1361-3723(23)70052-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.\",\"PeriodicalId\":503952,\"journal\":{\"name\":\"Computer Fraud & Security\",\"volume\":\"24 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer Fraud & Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.12968/s1361-3723(23)70052-3\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Fraud & Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.12968/s1361-3723(23)70052-3","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Redefining identity-first security with observability
An identity-first approach to security, based on a zero-trust model, is being widely adopted as the concept of the network perimeter disappears. But many of these projects will fail and others will not achieve the full benefits available. These challenges can be avoided if the organisation is equipped to assess and manage identity data holistically through a capability known as identity observability.