Zero Trust Step 4B: How to Secure Admin Access
Find Threat Talks on
Zero Trust Step 4B: How to Secure Admin Access
Admins hold the key to the proverbial kingdom – and this makes them a top target for attackers.
In part B of our deep dive into step four of Zero Trust (create Zero Trust policy), host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas unpack how to build Zero Trust policies specifically for administrative access.
They explore:
• Why admins are a high-value target – and what that means for policy
• How to build secure jump hosts and enforce strict access controls
• What ‘separation of identity’ really looks like in practice
Make sure to check out part A of this episode as well, where Lieuwe Jan and Rob Maas dive into the more general approach to policy creation and validation.
Additional Resources:
Your cybersecurity experts
Lieuwe Jan Koning
Co-Founder and CTO
ON2IT
Episode details
Not all access is created equal. When it comes to administrative accounts, the stakes are higher – and the policies should be stricter.
In this episode of Threat Talks, host Lieuwe Jan Koning and ON2IT Field CTO Rob Maas continue their exploration of Zero Trust step four: policy definition and validation. This time, they zoom in on administrative access.
From isolating admin tasks with jump boxes to implementing strong multifactor authentication and SSH key controls, this episode is packed with insights on how to lock down your most sensitive accounts.
In this episode of Threat Talks:
• Why admins are a high-value target – and what that means for policy
• How to build secure jump hosts and enforce strict access controls
• What ‘separation of identity’ really looks like in practice
👉 This is part B of our two-part deep dive into Zero Trust policy design. Make sure to check out part A, focused on general policy creation, as well.
Get your Hacker T-shirt
Join the treasure hunt!
Find the code within this episode and receive your own hacker t-shirt for free.
