Ebook
Least Permissive Trust: What Zero Trust Wishes It Could Be - Vol 2
In Volume 2 of Akamai’s ebook series on Least Permissive Trust, the focus is on advancing Zero Trust architecture through identity management, application access, and microsegmentation. This approach builds on the Cybersecurity and Infrastructure Security Agency’s framework, targeting federal agencies including the Department of Defense. Akamai emphasizes that identity is the foundation of Least Permissive Trust, essential for controlling access and securing applications. This evolutionary strategy enhances security by ensuring minimal necessary permissions and tighter segmentation to protect critical government assets.