Chapter 7 Identity Access Management and Jump Box
From your office window, you can see the production facility that serves as Juice Factory’s crown jewel. As CISO protecting these critical systems keeps you up at night. You know that identity and access management will be crucial for securing the environment, but implementing it properly requires a deep understanding of how the engineering team uses these systems. With this in mind, you head to the engineering department, determined to learn how they work and what controls would best protect their operations without hindering productivity.
This chapter is about dealing with the trust we put into the authentication and identity processes. How can we use the idea of Zero Trust to help reduce this risk inherent in identity access management (IAM)? Remember, the whole idea of Zero Trust is the processes of removing trust from systems and processes. How do we apply this idea to authentication and identity? Before we can go deeper into this question, we first need to have a basic understanding of what IAM is, and then we will go over how we can use Zero Trust to help secure the environment.
7.1 Identity Access Management
IAM is the process of verifying the identification of the person trying to get access to the system. Upon successful verification, it grants the user privileges according to their account’s access level.
There are many ways identities can be managed. The one most people are familiar with is the local accounts ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access