Intelligent CIO North America Issue 18 | Page 83

FINAL WORD enter . You would need reliable identification such as a pass or ticket backed up by photo ID like a driver ’ s license or passport . This would be very effective at keeping out non-VIPs . But it could also be frustrating for legitimate attendees who may not take kindly to requests to show photo ID , resulting in long delays . in a physical setting . In a digital environment , however , any or all of these approaches can be effectively implemented . It is all about the balance between productivity and security .
Zero Trust and risk-based verification
A more frictionless approach would be for guards to check visitors based on their appearance . Familiar guests could walk right in , but sketchy individuals would be asked to show ID . This would be better for most familiar guests , but it would create risks if guards weren ’ t familiar with everyone on the invitation list .
Another option aimed at cutting down on friction would be to look at the behavior and actions of guests . Security guards could monitor what people did , and if they abused their access or visited off-limits areas , for example , they could be challenged or removed .
While these scenarios are helpful to visualize how security controls work , they may not be very effective
In hybrid working environments , employees don ’ t want to be constantly interrupted by security controls . Equally , organizations looking to minimize friction still want to be able to accurately identify users and exclude unauthorized actors .
The solution to achieving this balance is a Zero Trust strategy using a risk-based approach with verification
It ’ s no secret that cybersecurity has a reputation for generating friction .
www . intelligentcio . com INTELLIGENTCIO NORTH AMERICA 83