Member-only story

How To Provide A Consistent & Secure User Access Experience

The Benefits Of An Enterprise User Access Framework To ZeroTrust

Chuck Johnson
4 min readDec 16, 2022

So you've commenced your ZeroTrust journey. You've spent more than you wanted on your gear, probably overpacked, and are trying to block out the noise from the C suite riding in the back of the car asking 'are we
there yet.'“ Where is there? What does ZeroTrust look like? What should our Information Security clients expect when accessing data within a ZeroTrust framework? To wow your customers, start with the following:

  • Defining A Secure & Successful Access Experience
  • Set Expectations On What's Required For Access
  • Establish A Framework To Measure Secure Access Objectively
  • Measure Access Security
  • Standardize & Enforce

Defining A Secure & Successful Access Experience

A successful access experience results in a successful (secure) outcome regardless of what's being accessed. This may appear obvious, but don't discount it. The sentence can be utilized to refine and define the goal.

So what's a successful (secure) outcome?

  • Success or failed connectivity based on the ZeroTrust policies in place.
  • Success or failed authentication which depends on what the user entered.

--

--

Chuck Johnson
Chuck Johnson

Written by Chuck Johnson

A witness to life; its patterns & flow. A discoverer of the essence of things. A creator of designs through observation. A security architect. Author.

No responses yet