Remember Defense-in-Depth? Apply It To The Customer Lifecycle. Users, especially those in customer identity, have a lifecycle. They register, they login, they give and revoke consent, and they update passwords or MFA settings. They may arrive via federation and they may be federated to other systems. Ultimately, they may decide to disable or delete their accounts. It's important to look at each of these steps along the customer lifecycle and apply some manner of threat modeling to it.
The What and the Why of Any Modern CIAM Platform When choosing a CIAM offering, there are many must-have capabilities which should be provided by the platform. We discuss what they are, why they're important to any digital transformation initiative, and most importantly, their importance and significance to the customer.