This blog was written by an independent guest blogger.
Hackers are continually finding more and more pathways into an organization’s internal environment. Not only is access widely available, it can also be alarmingly simple. Rather than having to actively hack systems, hackers often just log in using easily-obtained or compromised user identities and credentials.
To avert these types of attacks, many organizations have adopted zero trust policies that require a user to provide additional authentication before accessing an organization’s resources and data.
Traditional, identity-centric zero trust practices focusing solely on protecting the credentials of human users ignore a substantial set of vulnerabilities, namely those involving interactions between machines, applications and workloads. “Machine identities,” which now outnumber human identities 20:1, present organizations with additional security challenges.
To address those challenges, businesses must implement effective processes for recognizing machine identities, provisioning their access to…
Posted by: Nahla Davies |
The post Zero Trust policies – Not just for humans, but for machines and applications too appeared first on Cybersecurity Insiders.
February 12, 2021 at 04:21PM
0 comments:
Post a Comment