{"id":154949,"date":"2023-01-09T00:23:05","date_gmt":"2023-01-09T06:23:05","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2023\/01\/why-iams-identity-first-security-is-core-to-zero-trust"},"modified":"2023-01-09T00:23:05","modified_gmt":"2023-01-09T06:23:05","slug":"why-iams-identity-first-security-is-core-to-zero-trust","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2023\/01\/why-iams-identity-first-security-is-core-to-zero-trust","title":{"rendered":"Why IAM\u2019s identity-first security is core to zero trust"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/why-iams-identity-first-security-is-core-to-zero-trust2.jpg\"><\/a><\/p>\n<p><em>Check out all the on-demand sessions from the Intelligent Security Summit <a href=\"https:\/\/avolio.swapcard.com\/intelligentsecuritysummit2022\/registrations\/Start?utm_source=vb&utm_medium=boiler&utm_content=ondemand&utm_campaign=IS22_BoilerPlates\">here<\/a><\/em>.<\/p>\n<p>The faster attackers can gain control over human or machine identities during a breach attempt, the easier it becomes to infiltrate core enterprise systems and take control. Attackers, cybercriminal gangs and advanced persistent threat (APT) groups share the goal of quickly <a href=\"https:\/\/identitymanagementinstitute.org\/hackers-love-poor-iam-strategies\/\" target=\"_blank\" rel=\"noreferrer noopener\">seizing control<\/a> of identity access management (IAM) systems.<\/p>\n<p>Impersonating identities is how attackers move laterally across networks, undetected for months. <a href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/identity-access-management-iam\/\" target=\"_blank\" rel=\"noreferrer noopener\">IAM systems<\/a> \u2014 in particular, older perimeter-based ones not protected with <a href=\"https:\/\/venturebeat.com\/security\/zero-trust-is-critical-as-more-enterprises-sacrifice-security-for-speed\/\" target=\"_blank\" rel=\"noreferrer noopener\">zero-trust<\/a> security \u2014 are often the first or primary target.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Check out all the on-demand sessions from the Intelligent Security Summit here. The faster attackers can gain control over human or machine identities during a breach attempt, the easier it becomes to infiltrate core enterprise systems and take control. Attackers, cybercriminal gangs and advanced persistent threat (APT) groups share the goal of quickly seizing control [\u2026]<\/p>\n","protected":false},"author":662,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1492],"tags":[],"class_list":["post-154949","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/154949","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/662"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=154949"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/154949\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=154949"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=154949"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=154949"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}