Is it ok to shout in a library?
Normally - no...
But what if there's a fire?
Or you are making a TV comedy show in the early 2000s?
Context changes the situation.
Traditionally, cybersecurity has taken an over-simplistic view.
Take controlling access.
Are you this type of person?
Doing this type of role?
Well, you can have access.
This is Role-Based Access Control.
But life - and business - is more complex than this.
There are levels of nuance.
What's your situation?
What's your context?
If we can capture this nuance in access decisions, we can:
So, how do we achieve this?
Conditional Access and Context-Aware Access.
Conditional Access and Context-Aware Access are Microsoft and Google Workspace technologies at the heart of the new wave of "zero-trust architectures".
They are the engines deciding who to let in and keep out.
Using signals (about where you're connecting from, what device you're using, etc.), the engines make policy-based decisions that can be enforced as we see fit.
And so, as a business, we can work through scenarios - and decide what should happen in each situation and context.
Each policy and scenario layers on top of each other - sieving out unwanted and erroneous access.
All while letting business activities progress without compromise.
And therein lies the challenge. The fly in this ointment.
How do you manage all of the policies working together?
How do you ensure that all scenarios are addressed? And conflicts haven't occurred.
The current industry's best practice is to just ask an expert for their opinion.
But - at Fresh Security - we believe there's a different way.
A way to prove how effective your Conditional Access Policy is.
And have confidence that there aren't unforeseen gaps.
I'll share more in the coming weeks.