Internal Access
To adapt to the modern environment and embrace the mobile workforce, we have implemented a Zero Trust model for our internal users and devices, both inside and outside of our corporate network. Internal users must always prove their identity before being allowed access to our systems since no users or machines are automatically trusted.
To help us prove identity, we employ multi-factor authentication wherever possible. In most cases, this means 2-factor authorization (2FA) which requires something you know, such as a password, and something you have or something you are, such as a phone authenticator or biometrics. We also enforce strong password controls.
In addition, we provide our staff with least-privilege access, meaning we only give as much access as is needed to perform the job function. Access to sensitive information and cryptographic keys is strictly limited to those with a need to know.