Identity In A Zero Trust World

Identity In A Zero Trust World

Our solutions must continually validate the identity of the person accessing our applications and data.

We have a concept at SailPoint: identity at the center of security. While that may appear self-gratifying, when you dig a little deeper, you’ll discover why it’s accurate. Zero Trust has been the growing buzzword and theme for the last couple of years in security. At its core, it means we build our solutions to habitually question who someone is and what they want to do. We can no longer blindly trust a user that comes from a known location. We need to keep asking questions.

At the center of those questions is a critical concept: identity. Our solutions must continually validate the identity of the person accessing our applications and data. That includes authentication, authorization, and one that might not entirely be as obvious is administration. The identity becomes the Golden Key to ensuring that we can validate users. We need trusted sources that tell us who someone is and what access they should have. From there we can form the foundation of our policies that determine how things are accessed.

While it all sounds great in theory, what does that mean in reality? What steps do you take to get there? What does that mean for my firewall?

Let’s answer all of those questions.

First, let’s breakdown what it means to have a Zero Trust model. There is no such thing as an internal network. Whether someone is accessing from their office desk, Starbucks or even Bangladesh nothing changes as far as trust goes. There are no if/then rules for how strong the authentication is, based on whether the user is internal or external. As far as the app is concerned, all users are external. We implement MFA across the board, every user, every time, everywhere. We get smarter about authentication and ask a lot more questions of the user by including behavior patterns, and a more in-depth look at the user's attributes. Does the user know the password and are they logging in from a device we've seen before with an IP address we've seen before and from a location we expect? That’s a very different set of questions from a simple user authentication process that asks, “Does the user know the password and some random number?”

The second concept is that we question everything. We’ve verified who you are; now we need to verify what you are doing or asking to do. Are you trying to access payroll data during business hours from an IP address we see often? Including more context into our authorization decisions allows us to make access decisions based off of what’s happening right now instead of some static rule we set 6 months ago. We need the ability to build dynamic authorization policies that include information about the user and about what the user is trying to do. We need to add behavior patterns to understand what activity is considered normal and which are abnormal. Zero Trust means we have to be smarter and more in-depth in the actions we take to verify a user.

Everything we’ve talked about all centers around identity. Having a robust identity infrastructure gives you the ability to build more dynamic and identity-aware applications. Administration and governance is the first brick that must be laid to develop a robust solution. It’s your foundation. A trusted source is required to pull attributes needed for authorization policy and deeper authentication. The process of feeding that source and ensuring that the attributes are accurate is the where governance and administration come into play. This process allows you to control the lifecycle of new accounts and attributes and ensure they are aligned both from a quality perspective and policy perspective.

These concepts combine to give you a type of "Zero Trust" architecture. However, I want to take the time to make a crucial point about Zero Trust: it's not a solution. Zero Trust is a way of thinking, or perhaps even better stated, an approach. The entire concept is to challenge you to think differently about how you build your applications, networks, and security controls. You begin with the statement that you don't trust any user. You don't depend on a single attribute to determine your level of trust; instead, you continually build that trust with the user by asking questions. Who are you, where are you coming from, what are you trying to do, when are you trying to do it, etc., etc.? The common component for all of these questions is that you are trying to establish the person's identity so the more you establish their identity, the more you trust them, the more you trust them, the more access you give them. Identity remains central to good security posture, and in this Zero Trust world that doesn't change, in fact, it enhances the need for it.

Featured

  • AI Is Now the Leading Cybersecurity Concern for Security, IT Leaders

    Arctic Wolf recently published findings from its State of Cybersecurity: 2025 Trends Report, offering insights from a global survey of more than 1,200 senior IT and cybersecurity decision-makers across 15 countries. Conducted by Sapio Research, the report captures the realities, risks, and readiness strategies shaping the modern security landscape. Read Now

  • Analysis of AI Tools Shows 85 Percent Have Been Breached

    AI tools are becoming essential to modern work, but their fast, unmonitored adoption is creating a new kind of security risk. Recent surveys reveal a clear trend – employees are rapidly adopting consumer-facing AI tools without employer approval, IT oversight, or any clear security policies. According to Cybernews Business Digital Index, nearly 90% of analyzed AI tools have been exposed to data breaches, putting businesses at severe risk. Read Now

  • Software Vulnerabilities Surged 61 Percent in 2024, According to New Report

    Action1, a provider of autonomous endpoint management (AEM) solutions, today released its 2025 Software Vulnerability Ratings Report, revealing a 61% year-over-year surge in discovered software vulnerabilities and a 96% spike in exploited vulnerabilities throughout 2024, amid an increasingly aggressive threat landscape. Read Now

  • Motorola Solutions Named Official Safety Technology Supplier of the Ryder Cup through 2027

    Motorola Solutions has today been named the Official Safety Technology Supplier of the 2025 and 2027 Ryder Cup, professional golf’s renowned biennial team competition between the United States and Europe. Read Now

  • Evolving Cybersecurity Strategies

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.