Identity’s Role in Zero Trust
Zero Trust started a decade ago from the realization that the traditional perimeter-centric security model had failed. But how does identity fit into that? What are the design principles and properties a solution should have? In this talk, we discuss how we got here, and what the maturity model for Identity in Zero Trust looks like.