MicroZAccess: Core Functions

Discover how MicroZAccess Operates.

MicroZAccess facilitates least privileged access to resources by establishing a mutually authenticated peer-to-peer encrypted Overlay network. This process involves several key steps:

  • Verify User & Device: Users and devices undergo multifactor authentication with the Identity Provider (IdP) to validate their identities. Additionally, the device's trustworthiness and security posture are evaluated to ensure a secure connection.

  • Verify Enhanced Identity & Context: MicroZAccess evaluates various security policies, taking into account factors such as user identity, device posture, group memberships, location, and time. This enhanced identity and context provide a comprehensive view of the user and device, enabling more precise access control decisions.

  • Establish Micro-Tunnels: Micro-segmentation is implemented by creating micro-tunnels that directly connect the user or device to the target applications or resources. These micro-tunnels ensure secure and direct communication without the need for traffic to pass through a central point.

  • Least Privilege Access to Resources: MicroZAccess enforces least privilege access by limiting user access to resources based on predefined policies. This includes controlling North-South access, where users access services or resources, as well as East-West access, where services communicate with each other. By strictly adhering to the principle of least privilege, MicroZAccess reduces the attack surface and minimizes the risk of unauthorized access.

Through these steps, MicroZAccess provides a robust and secure framework for accessing resources, ensuring that users and devices are authenticated, and access is granted based on granular policies and contextual information. This approach helps organizations achieve a higher level of security and control over their network infrastructure while enabling efficient and protected access to the resources users need.

Last updated