CTRL-A: Access Management
Trust Nothing - Verify Everything. Bad people do bad things. But so do stupid people if the tools they work with allow them to do so. Building a Zero Trust infrastructure requires verifying users are who they say they are; they are where they ought to be; they are using a device they are supposed to use; they are coming through a known channel; they are accessing applications/functions/data/APIs for which they have been granted the rights to do so; and they are doing it in a manner which is consistent with prior behaviour.
CTRL-A, built on IBM technology, helps address the core requirements of an access management platform in the context of Zero Trust by providing:
- Policy Enforcement Point
- Strong Authentication Mechanisms
- Adaptive/Risk Based Authentication
- Federation Standards Adherence