Skip to main content

Save or Share this Report

For Security & Risk Professionals

Apply Zero Trust eXtended Principles In Your Identity And Access Management Programs

Protect Data And Boost The User Experience With A ZTX IAM Architecture, People, And Process

November 25, 2019


Why Read This Report

With the loss of a physical perimeter in protecting applications and data from external and internal threats, the "people" domain of Zero Trust eXtended (ZTX) is one of the most dynamically changing and growing areas. In this report, we look at major IAM areas and highlight best practices for S&R professionals to repeatably and robustly implement Zero Trust in the people domain.

Get Access

Already a Client?

Log in to read this document.

Become a Forrester Client

Customers are the new market-makers, reshaping industries and changing how businesses compete and win. Success depends on how well and how fast you respond. Forrester Research gives you insights and frameworks aligned to your role to shorten the time between a great idea and a great outcome, helping your teams win in the age of the customer. Contact us to learn more.

Purchase Report

This report is available for individual purchase ($745 USD).


Table of Contents

  • Zero Trust IAM Is A Mosaic Of Architectures, People, And Processes
  • Step 1: Use IMG To Lay The Foundation
  • Step 2: Rethink Access Control; No Passwords, Please!
  • Step 3: Assign Every Data Asset Its Own Data Identity
  • Step 4: Weed Out Hardcoded Credentials In PIM
  • Step 5: Encrypt All Data In Directories
  • Related Research Documents

Recommended Research