Ebook

Least Permissive Trust: What Zero Trust Wishes It Could Be - Vol 2

Least Permissive Trust: What Zero Trust Wishes It Could Be - Vol 2

Pages 25 Pages

In Volume 2 of Akamai’s ebook series on Least Permissive Trust, the focus is on advancing Zero Trust architecture through identity management, application access, and microsegmentation. This approach builds on the Cybersecurity and Infrastructure Security Agency’s framework, targeting federal agencies including the Department of Defense. Akamai emphasizes that identity is the foundation of Least Permissive Trust, essential for controlling access and securing applications. This evolutionary strategy enhances security by ensuring minimal necessary permissions and tighter segmentation to protect critical government assets.

Join for free to read