Some concepts to assist with improving security of an identity and access management fabric:

  1. IAM risk must focus on the end to end life cycle of the identity
  2. Identities for people, software and hardware must be considered
  3. Every digital identity (human and non-human) must resolve to a carbon physical person who is accountable for it
  4. Vulnerability analysis must cover both identity data and identity behaviour
  5. A human readable description must be present for all permissions, policies, scopes and claims
  6. For humans, authentication events must bind to a validated and verified biometric profile
  7. Session material and access tokens should be bound to the requesting context. IE device or process
  8. Authorization enforcement should validate previously captured context
  9. Native identity and permissions changes should be prohibited by default
  10. Changes to policy must be related to runtime risk

Further Reading:

Last Updated: Jan 2025

Categories:

Tags:

Signup for New Content Updates