Page 193 - Cyber Defense eMagazine December 2023
P. 193
Furthermore, policy-based access control, whether for network entry or intra-network activities, should
be tied to accurate, up-to-date data. Implementing robust procedures to ensure data accuracy and
continuously auditing and monitoring identity data can thwart attempts to corrupt the system. It's not just
about building effective access policies anymore; it's about ensuring the underlying data used to enforce
those policies is rock-solid.
Overall, in today’s era of advanced persistent threats, security isn't solely about constructing barriers; it's
about understanding and verifying identities at a granular level across the organization. This approach
demands meticulous attention to the quality, visibility and continuous monitoring of identity data. Any
compromise in this aspect does not just signify a loophole—it threatens to unravel the entire fabric of an
organization's security infrastructure.
About the Author
Wade Ellery is the Field Chief Technology Officer with Radiant Logic. Wade has over
20 years of increasing responsibility and experience in Enterprise IT direct and
channel software and services sales and management. He holds in-depth knowledge
and experience in enterprise IAM, IAG, Risk and Compliance, and IT Security
products.
www.radiantlogic.com
Cyber Defense eMagazine – December 2023 Edition 193
Copyright © 2023, Cyber Defense Magazine. All rights reserved worldwide.