When someone tries to access your internal systems, how can you be sure a user is who they claim to be? We live in an age of cloud computing and enhanced mobility, with many employees working on the go.
Today’s organisations should refresh their approach to authentication from a one-time event to continuous monitoring of users and what they are accessing. In broad terms, this is called identity assurance.
Compiled by leading security firm RSA, this white paper will take you through those six key elements to a risk-based approach in an informative and easy-to-digest format. Here’s a teaser of the first element:
Business context. This includes the who, what, and where regarding any access request. This could include the person, the data, and the environment. Is the person an IT administrator with limitless access? How do you apply appropriate security and assurance to that type of access?