Scott Hesford has over a decade of experience in IT security. Before joining BeyondTrust in 2019, he worked as Principal Consultant for CA Technologies and other large enterprises in Australia and New Zealand. A trusted cyber security advisor to enterprise customers, his experience spans across several industries such as banking, insurance, energy and utilities, in addition to state and federal governments. At BeyondTrust, Mr Hesford is an essential contributor in the regional security engineering department, helping enterprises and government agencies improve their security posture against internal and external threats.
As passengers, every time we travel through an airport we move through checkpoints to confirm our identity and that we are in the correct place.
There are similarities between an airport and least privilege: the concept and practice of restricting access rights for users, accounts, and computing processes to only those resources absolutely required to perform routine, legitimate activities. In fact, NIST, the authors of a number of documents on Zero Trust, leverage the airport analogy to describe best practices around Zero Trust and identity.
So what can we learn from the checks and balances of an airport to apply to our own organisations’ Zero Trust efforts?
Join Scott Hesford, Solutions Director APJ at BeyondTrust, as he looks at the airport analogy, described by NIST in its Zero Trust documentation, and how modern PAM solutions can support the implementation of Zero Trust.