From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Identity governance and lifecycle management
From the course: Zero Trust Architecture for Security Architects: From Network Design to Identity Integration
Identity governance and lifecycle management
- [Narrator] Think of digital identities like keys. Over time, keys are copied, forgotten, or lost, and suddenly you have dozens of doors unlocked with no idea who has access. In Zero Trust, identity isn't just a one-time validation, it's a living, breathing control point that must evolve with a user, and that's where identity governance and lifecycle management becomes critical. Identities often outlive their original purpose. For example, people change roles, leave projects, or even exit the company, but their access still active. This leads to privilege creep where users accumulate unnecessary permissions over time, whereas governance ensures that access is granted, reviewed, and revoked appropriately. Lifecycle management enforces least privilege and avoids misuse. And Zero Trust, without governance, enforcement breaks. You can't verify or restrict what you don't track. Let's walk through how identity should be managed…
Contents
-
-
-
-
-
(Locked)
The role of identity in Zero Trust3m 13s
-
(Locked)
Integrating MFA, SSO, and federated identity5m 1s
-
(Locked)
Identity governance and lifecycle management3m 30s
-
(Locked)
Least privilege access and RBAC4m 10s
-
(Locked)
Just-in-time (JIT) access and policy enforcement4m 44s
-
(Locked)
Zero Trust network access (ZTNA) and SASE integration4m
-
(Locked)
-
-