Forum Discussion
ShimKwan
Apr 21, 2021Brass Contributor
Application access / permissions trends and best practices
Hi, Have a question around trends/best practices and application access. Back in the "old" days application access was controlled from within the app, whereby roles may have been defined within the...
eneshfernando
Apr 21, 2021Copper Contributor
Old era connectivity through the internet is limited. Networking among People, Process and Technology is very much limited within a contained area. Considering the threat vectors for identities are very much narrowed in scope. With the advancement of internet era, all the AAA services including Authentication, Authorization and Accounting flip to a different level. As an example Kerberos cannot meet the requirements on the authentication anymore. Password considered as no longer safe and moved to multi-factor authentication mechanisms such as human bio metrics, RFID and PINs.
Considering the hot topic on Zero Trust Architecture all elements should be treated as un trusted.
Considering the hot topic on Zero Trust Architecture all elements should be treated as un trusted.
- ShimKwanMay 06, 2021Brass ContributorThanks for the reply, doesn't really answer the question though.