Sept. 15, 2022, 11 p.m. | Scott Carter

Security Boulevard securityboulevard.com

Using Machine Identity Management to Extend Zero Trust to Partners

Scott Carter

Thu, 09/15/2022 - 16:00




Authorizing external partners adds a layer of complexity

Authorizing access is already challenging enough for organizations that are interacting with their own employees, their own systems, their own machines. I wrote about how machine identities contribute to that effort in a previous blog. But when you add different external partners you need to interact with, it adds new layers of complexity. …

identity identity management machine machine identity machine identity management management partners trust zero trust

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Level 1 SOC Analyst

@ Telefonica Tech | Dublin, Ireland

Specialist, Database Security

@ OP Financial Group | Helsinki, FI

Senior Manager, Cyber Offensive Security

@ Edwards Lifesciences | Poland-Remote

Information System Security Officer

@ Booz Allen Hamilton | USA, AL, Huntsville (4200 Rideout Rd SW)

Senior Security Analyst - Protective Security (Open to remote across ANZ)

@ Canva | Sydney, Australia