Best Practice Report

How To Secure And Govern Nonhuman Identities

Apply Zero Trust IAM Principles To Secure Software Bots, Physical Robots, And IoT Devices

January 6th, 2021
Sean Ryan, null
Sean Ryan
With contributors:
Merritt Maxim , Benjamin Corey , Peggy Dostie


Software bots, physical robots, and internet of things (IoT) devices connected to critical IT systems boost productivity but also amplify operational challenges related to discovery, lifecycle management, and compliance. Organizations can benefit from an identity and access management (IAM) strategy that aligns to all four stages of Forrester’s IAM Lifecycle Model. This report shows security and risk (S&R) pros how to establish an effective IAM strategy to managed and govern this emerging class of nonhuman identities in ways that offer confidentiality, integrity, and empathy in security operations.

Want to read the full report?

Contact us to become a client

This report is available for individual purchase ($1495).

Forrester helps business and technology leaders use customer obsession to accelerate growth. That means empowering you to put the customer at the center of everything you do: your leadership strategy, and operations. Becoming a customer-obsessed organization requires change — it requires being bold. We give business and technology leaders the confidence to put bold into action, shaping and guiding how to navigate today's unprecedented change in order to succeed.