Beyond perimeter protection: Identity and access management in the zero trust model

The term “Zero Trust” was founded in 2010 by Forrester Research Analyst John Kindervag. In addition to thorough asset management and established analytical skills, identity and access management (IAM) plays a key role.

Zero trust is not a technology and also not a process that can be achieved. Rather, it is a guide to the overall cybersecurity direction of an organization. True to the motto “Do not trust anyone”, the name says it all at Zero-Trust. The assets worth protecting – especially data – of a company should of course be available to the employees during the creation of value, but at the same time they should be protected against unauthorized access.