Continuous Authorization

As one of the core principles of zero trust, continuous authorization leverages real-time device posture and trust, user trust, and resource sensitivity as defined in granular policy controls. In this scenario, trust is not only verified at the beginning of each request, it continuously verifies that the request remains trustworthy throughout the entirety of the session. In order for continuous authorization to work in practice, two things are required:

  1. Continuous Quantified Trust – Constant, thorough analysis of the trustworthiness of the user and their device.
  2. Instant Access Control – The ability to instantly revoke access if trustworthiness falls below a specified threshold, re-granting access for future requests if trustworthiness rises sufficiently.

Related Terms

BYOD (Bring Your Own Device)

A policy that allows employees to use their personal devices to access web resources, necessitating SWG solutions ...

Device Identity

Device Identity refers to the ability to uniquely identify a specific device, much as you would identify a user. ...

Device Inventory

A comprehensive list of devices within an organization's network, including details such as device types, serial ...

Device Manager

An Enterprise Device Manager (abbreviated EDM, and sometimes referred to as MDM or UEM) enables IT administrators ...

Device Posture Assessment

The process of evaluating and determining the security posture of a device, such as a computer, mobile device, or ...

Device Trust Scoring

Trust Scoring: The calculation of a device’s Trust Level by evaluating the Effect of each Trust Factor.

Endpoint Detection and Response (EDR)

EDR is endpoint security technology that continuously monitors end-user devices to detect and respond to cyber ...

Endpoint Protection

Security solutions and measures implemented to secure endpoints, such as computers, laptops, and mobile devices, ...

Endpoint Security

Security measures and tools implemented on individual devices, such as laptops, smartphones, or tablets, to ...

Firewall

A Firewall is a security mechanism that monitors and controls incoming and outgoing network traffic. It's often ...

Granular Trust Scoring

Granular Trust Scoring is a feature that allows Trust Factors to be assigned an Effect, used to evaluate ...

Identity Provider (IdP)

An Identity Provider (IdP) is tasked with verifying users’ identities and communicating with the service provider ...