Under active development Content is continuously updated and improved

IAM-24Zero Trust Enterprise Network

>Control Description

Organization users are authenticated against a Zero Trust model prior to gaining access to organization resources.

Theme

Technology

Type

Preventive

Policy/Standard

Access Control Policy

>Implementation Guidance

1. Ensure that a process is defined and documented for the organization's zero trust architecture. 2. Ensure that a zero trust access authorization infrastructure is effectively operating for accessing organization's resources.

>Testing Procedure

1. Inspect and validate that a process is defined and documented for the organization's zero trust architecture. 2. Validate whether all access to organization's resources are via a zero trust method.

>Audit Artifacts

E-IAM-24
E-IAM-33

>Framework Mappings

Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.

Ask AI

Configure your API key to use AI features.