IAM-24—Zero Trust Enterprise Network
>Control Description
Organization users are authenticated against a Zero Trust model prior to gaining access to organization resources.
Theme
Technology
Type
Preventive
Policy/Standard
Access Control Policy>Implementation Guidance
1. Ensure that a process is defined and documented for the organization's zero trust architecture. 2. Ensure that a zero trust access authorization infrastructure is effectively operating for accessing organization's resources.
>Testing Procedure
1. Inspect and validate that a process is defined and documented for the organization's zero trust architecture. 2. Validate whether all access to organization's resources are via a zero trust method.
>Audit Artifacts
E-IAM-24
E-IAM-33
>Framework Mappings
Cross-framework mappings provided by Adobe CCF Open Source under Creative Commons License.
Ask AI
Configure your API key to use AI features.