Remove tag physical-identity-access-management
article thumbnail

Zero Trust with Zero Data

Phil Windley

Summary: The physical world is full of zero trust examples, but they gather attributes for the access control decisions in a very different way than we're used to online. If we assume breach, then the only strategy that can protect the corporate network, infrastructure, applications, and people is to authorize every access.

Data 66
article thumbnail

Zero Trust

Phil Windley

My new book Learning Digital Identity from O'Reilly Media covers many of the topics in this post such as multi-factor authentication, authorization and access control, and identity policy development in depth. password, fingerprint, OTP) before granting access.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Data-Aware Security: How to Take a 360 View of Cloud Security

CIO Business Intelligence

Platform, software and service providers pledge to maintain security at the physical infrastructure and network level, but none will shoulder the burden of protecting customer workloads and data. I can use single sign-on to access my applications portal and get to whatever I need under a zero-trust policy.”.

article thumbnail

Wallets and Agents

Phil Windley

Summary: This post is adapted from my forthcoming book, Learning Digital Identity , from O'Reilly Media. Our physical wallets are, historically, for holding currency. But the analogy to a physical wallet can only take us so far, because as physical beings, our natural capabilities are multitude.

article thumbnail

Streaming Trust

Phil Windley

Summary: Federated identity stores are like music CDs: large troves of data to be consumed from a single source. Self-sovereign identity is like streaming: share just what you want, just when it's needed. She compares traditional approaches to identity and newer, decentralized approaches to the move from music CDs to streaming.

Banking 52
article thumbnail

Life is a Metasystem

Phil Windley

Think of them like an internet-native business that's collectively owned and managed by its members. They have built-in treasuries that no one has the authority to access without the approval of the group. Identity is foundational to almost everything we do. Metasystems are more general purpose.

article thumbnail

Relationships and Identity

Phil Windley

Summary: We build digital identity systems to create and manage relationships—not identities. Identity systems should provide relationship integrity and utility to participants for the appropriate length of time. SSI provides improved support for creating, managing, and using digital relationships.