With Attribute Based Access Control, we can be very specific about who – and remember the key point about who is IDENTITY and fundamental to Zero Trust is that we limit access to those that are undeniably authorised and authenticated – who can do what, When, Where and How they can access data or an application. We need then to have a policy mechanism that assures us about who when what and how they can share that data or application access. In addition, we need to be able to change our trust based on actions performed, threshold released. or suspicions aroused and we need to log and review actions performed.

Customer Reviews
You must log in to post a comment.
Thanks for submitting your comment!