{"id":30986,"date":"2023-07-11T16:34:16","date_gmt":"2023-07-11T16:34:16","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/?p=30986"},"modified":"2023-08-08T21:53:48","modified_gmt":"2023-08-08T21:53:48","slug":"zero-trust-iam","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/","title":{"rendered":"How to Enhance IAM by Adding Layers of Zero Trust"},"content":{"rendered":"\n<p>As credential attacks become more sophisticated, identity and access management solutions need to become more innovative. Zero trust concepts \u2014 assuming no user can be trusted until fully verified \u2014 should be applied to both users and devices to help protect sensitive company and customer information.<\/p>\n\n\n\n<p>This guide to zero trust and IAM breaks down these terms, why they&#8217;re important, and how they might work together in IT environments. We&#8217;ll look at <strong><a href=\"https:\/\/link.technologyadvice.com\/r\/kolide-esp-b2d-zero-trust-iam\" target=\"_blank\" rel=\"nofollow sponsored noopener\">Kolide<\/a><\/strong> \u2014 this article&#8217;s sponsor and a provider of device trust solutions \u2014 as one way to increase trust in users accessing applications and IT systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is Zero Trust IAM (Identity Access Management)?<\/h2>\n\n\n\n<p>To understand how <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-hype-vs-reality\/\">zero trust<\/a> and IAM can work together, it&#8217;s best to understand how they work on their own.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Zero trust<\/strong> is an approach to infrastructure security that never automatically trusts a user before verifying their identity and authorization. Zero trust also doesn&#8217;t restrict security to the network perimeter, since plenty of threats can slip through a firewall and move laterally through an organization&#8217;s network. Stopping lateral movement and attack escalation is one of the key benefits of zero trust.<\/li>\n\n\n\n<li><strong>IAM<\/strong> manages both users&#8217; identities and their rights to access company applications and other systems. An <a href=\"https:\/\/www.esecurityplanet.com\/products\/best-iam-software\/\">IAM tool<\/a> compares access attempts against stored credentials to determine if a user is who they say they are. It then provides access according to predefined access policies.<\/li>\n<\/ul>\n\n\n\n<p>Zero trust only permits a user or device once it has proven itself compliant with all of an enterprise&#8217;s predefined policies. IAM enforces identity and access management policies. Basically, IAM is a component of <a href=\"https:\/\/www.esecurityplanet.com\/products\/zero-trust-security-solutions\/\">zero trust security<\/a>, but it isn&#8217;t everything. The two are not interchangeable, but IAM helps organizations standardize and verify user identities.<\/p>\n\n\n\n<p>Keep in mind that zero trust cannot be achieved by purchasing a single product, and it takes time to implement a comprehensive architecture. However, some vendors offer pieces of the zero trust puzzle, helping employees achieve compliance with their organization&#8217;s security goals.<\/p>\n\n\n\n<p><strong>Read more about the <a href=\"https:\/\/www.esecurityplanet.com\/trends\/zero-trust-challenges\/\">challenges of zero trust<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Can You Add Zero Trust to IAM?<\/h2>\n\n\n\n<p>To implement zero trust concepts within your company&#8217;s identity and access management, your IT and security teams must rethink each sector of your IT infrastructure. Examples include network access controls, biometrics, and device security.<\/p>\n\n\n\n<p>While no single vendor can give your business an all-encompassing zero trust solution, there are providers who offer specific products to address facets of zero trust. Kolide is one such provider. It&#8217;s a security tool that integrates with Okta and focuses on the device part of zero trust. Just because a business decides to trust a device doesn&#8217;t mean it&#8217;s trustworthy. Kolide authenticates devices as they log into Okta. If a given device doesn&#8217;t meet a certain set of activated policies, the device is blocked.<\/p>\n\n\n\n<p>Typically, a zero trust architecture gives IT teams hiccups because every blocked device or user, every set of failed credentials that possibly indicates a breach, must then be routed through them. This often looks like a deluge of support tickets that IT admins must manually sort through. Kolide decreases the manual load on IT teams by providing self-service options for users when a device is blocked.<\/p>\n\n\n\n<p>A security or IT team member has already set a policy to block any devices with insecure browsers. When a user tries to log into Okta and pass the Kolide verification, they&#8217;re blocked because their Google Chrome is out of date.<\/p>\n\n\n\n<p>Kolide is designed to help user devices become compliant and to reduce the manual burden on IT teams. Therefore, users aren&#8217;t just hung out to dry when their device is blocked. Instead, they have the immediate option to fix the issue. Kolide provides a list of remediation instructions, which users can access simply by clicking the &#8220;Details&#8221; button (screenshot below).<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/07\/kolide-google_chrome_out_of_date.png\" alt=\"Google Chrome out of date screenshot on the Kolide platform.\" class=\"wp-image-30988\" width=\"900\" height=\"638\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date.png 1200w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-300x213.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-1024x726.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-768x545.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-150x106.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-696x494.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-google_chrome_out_of_date-1068x757.png 1068w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><figcaption class=\"wp-element-caption\"><em>Image credit: Kolide<\/em><\/figcaption><\/figure>\n\n\n\n<p>Rather than immediately blocking devices without providing further information, Kolide is intended to show users how to make their devices compliant. If the device is the problem and the issue isn&#8217;t identified and fixed, users will continue running into roadblocks when they attempt to access necessary applications. But with software that educates users and tells them why a device has been blocked, employees are able to more quickly solve expired licenses or software updates. And by self-servicing the problem, users reduce the load on IT teams.<\/p>\n\n\n\n<p>By focusing on device vulnerabilities, Kolide can identify issues like Mac computers with bad batteries and Microsoft product installations with falsified or expired licenses. Some of these might just be an update that fell through the cracks, but some could be an unauthorized user from outside the organization.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1077\" height=\"868\" src=\"https:\/\/www.esecurityplanet.com\/wp-content\/uploads\/2023\/07\/kolide-blocked_windows_genuine.png\" alt=\"Device blocked notification stating Microsoft Windows requires a license activation in the Kolide platform.\" class=\"wp-image-30987\" srcset=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine.png 1077w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-300x242.png 300w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-1024x825.png 1024w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-768x619.png 768w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-150x121.png 150w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-696x561.png 696w, https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/kolide-blocked_windows_genuine-1068x861.png 1068w\" sizes=\"(max-width: 1077px) 100vw, 1077px\" \/><figcaption class=\"wp-element-caption\"><em>Image credit: Kolide<\/em><\/figcaption><\/figure>\n\n\n\n<p>Kolide specifically focuses on the devices attempting to access business services. While a user&#8217;s identity might be verifiable, their device&#8217;s security could have vulnerabilities or might already be compromised. Kolide doesn&#8217;t automatically trust devices until they demonstrate compliance with its policies, which users can configure in accordance with their business&#8217;s security strategy.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Going Beyond Identity Management<\/h2>\n\n\n\n<p>Although IAM plays a critical role in security infrastructure, its drawback is limited focus, according to Nick Fitzsimmons, VP of Marketing at Kolide. IAM mainly just verifies the user&#8217;s identity.<\/p>\n\n\n\n<p>&#8220;But that&#8217;s only half the battle,&#8221; Fitzsimmons said. &#8220;A legitimate user can still do a lot of damage if their device is infected with malware. What makes Kolide different from those tools, and other endpoint security tools, is that we can check virtually anything about a device&#8217;s posture, and restrict access based on that.&#8221;<\/p>\n\n\n\n<p>Additionally, all users must have Kolide on their phone or laptop to authenticate their connection. Threat actors aren&#8217;t able to use stolen credentials to log into applications using Kolide.<\/p>\n\n\n\n<p>Compliance-based device authorization is just one example of developing zero trust strategies within a business IT system. Integrating &#8220;never trust, always verify&#8221; policies within your identity and access management solution \u2014 in this case, Okta \u2014 helps teams avoid issues that standard IAM might not be able to solve.<\/p>\n\n\n\n<p>Zero trust applies to every sector of your IT infrastructure. It&#8217;s not a set-and-forget solution, but it gives businesses a clearer view of their user and device access attempts and the vulnerabilities that plague them.<\/p>\n\n\n\n<p><strong>Learn more about <a href=\"https:\/\/www.esecurityplanet.com\/networks\/how-to-implement-zero-trust\/\">implementing a zero trust infrastructure<\/a>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zero Trust Builds a Granular Security Infrastructure<\/h2>\n\n\n\n<p>In cybersecurity, granularity simply means detail and specificity. In other words, can our organization build such specific policies, unique to our needs and security requirements, that we successfully protect our applications and data?<\/p>\n\n\n\n<p>Zero trust builds additional context for identity and access management. For example, Kolide&#8217;s approach to policy customization lets teams create very specific rules. Kolide then has context for users&#8217; devices, can determine whether that device complies with predetermined policies, and can block a device if it seems to pose a threat. This is all based on the access criteria that&#8217;s important to an individual organization. Zero trust should be customizable.<\/p>\n\n\n\n<p>According to Fitzsimmons, there are two major challenges for businesses to develop zero trust within an existing IAM framework. &#8220;The first is that they need to provide real-time device posture at the point of authentication that can align with industry standards and internal policies,&#8221; Fitzsimmons said. &#8220;This has to be cross-platform and able to go deeper than the basics like hard drive encryption and firewall status.<\/p>\n\n\n\n<p>&#8220;The second is that they can\u2019t simply leave users blocked without the context and agency to unblock themselves. This creates the IT bottleneck that often leads to failed Zero Trust implementations.&#8221;<\/p>\n\n\n\n<p>It&#8217;s critical for users to take on some responsibility for the role they play in zero trust, not least because that helps IT teams focus on their roles within the organization.<\/p>\n\n\n\n<p>Is a granular security infrastructure difficult to implement? It can be. IT and security teams aren&#8217;t always used to this level of detail. And zero trust is a relatively new approach to cybersecurity. But it&#8217;s worthwhile, especially for enterprises that want to take their protective measures into their own hands.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bottom Line: Zero Trust and IAM for Enterprises<\/h2>\n\n\n\n<p>Keep in mind that device compliance is only one aspect of zero trust. To compile a full zero trust architecture, your organization will have to strategically choose solutions that address zero trust and IAM, integrate well with each other, and make sense for your security requirements. A financial services firm will have different security policies than a locally based nonprofit. However, they can both benefit from a zero trust approach to identity management \u2014 it just might look different.<\/p>\n\n\n\n<p>Don&#8217;t be discouraged if it takes your IT and security teams a significant amount of time to deploy zero trust concepts, even if you already use an IAM solution. IAM is just one component of zero trust, but it&#8217;s a good start. Tools like Kolide can help businesses develop a comprehensive security infrastructure, but don&#8217;t be afraid when that process takes time. It&#8217;s still one of the best choices you can make for your business&#8217;s overall cyber protection.<\/p>\n\n\n<div id=\"ta-campaign-widget-66d6d1608a40c-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6d1608a40c\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6d1608a40c\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6d1608a40c\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6d1608a40c\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6d1608a40c\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6d1608a40c\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.<\/p>\n","protected":false},"author":238,"featured_media":30991,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[2369,3790,12335,7750,3414,730,5277,30581],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[378,384,31781,381,380,393,31775,392,396],"class_list":["post-30986","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networks","tag-cloud-security","tag-cybersecurity","tag-iam","tag-identity-and-access-management","tag-network-security","tag-security","tag-web-security","tag-zero-trust-security","b2b_audience-awareness-and-consideration","b2b_product-endpoint-security","b2b_product-identity-management-privacy","b2b_product-multi-factor-access-management","b2b_product-network-access-control-nac","b2b_product-policy-compliance","b2b_product-virtual-private-network-vpn","b2b_product-web-applications-security","b2b_product-web-security","b2b_product-wireless-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Use Zero Trust in Identity &amp; Access Management<\/title>\n<meta name=\"description\" content=\"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Use Zero Trust in Identity &amp; Access Management\" \/>\n<meta property=\"og:description\" content=\"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-11T16:34:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-08T21:53:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1400\" \/>\n\t<meta property=\"og:image:height\" content=\"933\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jenna Phipps\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jenna Phipps\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\"},\"author\":{\"name\":\"Jenna Phipps\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\"},\"headline\":\"How to Enhance IAM by Adding Layers of Zero Trust\",\"datePublished\":\"2023-07-11T16:34:16+00:00\",\"dateModified\":\"2023-08-08T21:53:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\"},\"wordCount\":1524,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png\",\"keywords\":[\"cloud security\",\"cybersecurity\",\"IAM\",\"identity and access management\",\"network security\",\"security\",\"Web security\",\"zero trust security\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\",\"name\":\"How to Use Zero Trust in Identity & Access Management\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png\",\"datePublished\":\"2023-07-11T16:34:16+00:00\",\"dateModified\":\"2023-08-08T21:53:48+00:00\",\"description\":\"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png\",\"width\":1400,\"height\":933,\"caption\":\"Virtual black cube with zero trust inscription on a technological design background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Enhance IAM by Adding Layers of Zero Trust\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb\",\"name\":\"Jenna Phipps\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg\",\"caption\":\"Jenna Phipps\"},\"description\":\"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/jphipps\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Use Zero Trust in Identity & Access Management","description":"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/","og_locale":"en_US","og_type":"article","og_title":"How to Use Zero Trust in Identity & Access Management","og_description":"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/","og_site_name":"eSecurity Planet","article_published_time":"2023-07-11T16:34:16+00:00","article_modified_time":"2023-08-08T21:53:48+00:00","og_image":[{"width":1400,"height":933,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png","type":"image\/png"}],"author":"Jenna Phipps","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Jenna Phipps","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/"},"author":{"name":"Jenna Phipps","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb"},"headline":"How to Enhance IAM by Adding Layers of Zero Trust","datePublished":"2023-07-11T16:34:16+00:00","dateModified":"2023-08-08T21:53:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/"},"wordCount":1524,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png","keywords":["cloud security","cybersecurity","IAM","identity and access management","network security","security","Web security","zero trust security"],"articleSection":["Networks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/","url":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/","name":"How to Use Zero Trust in Identity & Access Management","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage"},"thumbnailUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png","datePublished":"2023-07-11T16:34:16+00:00","dateModified":"2023-08-08T21:53:48+00:00","description":"Discover how to strengthen IAM software by integrating multiple layers of zero trust. Enhance security and protect your assets effectively.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#primaryimage","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/07\/esp-zero-trust-iam.png","width":1400,"height":933,"caption":"Virtual black cube with zero trust inscription on a technological design background."},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/zero-trust-iam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How to Enhance IAM by Adding Layers of Zero Trust"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/243ac4ed3a5e9bf35bd7b98a40c326fb","name":"Jenna Phipps","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2023\/02\/EDITED-HH-88484840_Jenna_Phipps_Jenna_headshot_2_editor_faharia-150x150.jpg","caption":"Jenna Phipps"},"description":"Jenna Phipps is a staff writer for eSecurity Planet and has years of experience in B2B technical content writing. She covers security practices, vulnerabilities, data protection, and the top products in the cybersecurity industry. She also writes about the importance of cybersecurity technologies and training in business environments, as well as the role that security plays in data storage and management. When Jenna's not writing about security, you can find her reading, shopping, eating smoothie bowls, or spending time with friends.","url":"https:\/\/www.esecurityplanet.com\/author\/jphipps\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30986"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/238"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=30986"}],"version-history":[{"count":2,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30986\/revisions"}],"predecessor-version":[{"id":31378,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/30986\/revisions\/31378"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media\/30991"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=30986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=30986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=30986"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=30986"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=30986"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=30986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}