Security News > 2022 > April > 4 steps for building an orchestrated authorization policy for zero trust
Policies must be written to account for this, and the strongest policies are built on an authorization model that is orchestrated in nature.
An orchestrated and centralized approach to authorization builds dynamic and fine-grained access control policies that meet the demands of modern security strategies including zero trust.
Taking a zero-trust approach to policy building eliminates absolute trust from the equation by continuously validating users at all layers of the application based on a set or combinations of attributes collected from multiple sources.
Shifting to an orchestrated approach to authorization removes the siloed approach and replaces it with a centralized, overarching view of policies.
A policy based on centralized authorization orchestrated across an enterprise requires several key elements obtained through the policy modeling process.
The final step of a centralized, orchestrated approach - and where the concept of zero trust comes into action - is in policy authoring.
News URL
https://www.helpnetsecurity.com/2022/04/18/orchestrated-authorization/