{"id":104651,"date":"2025-02-25T16:06:48","date_gmt":"2025-02-25T08:06:48","guid":{"rendered":"https:\/\/version-2.com\/?p=104651"},"modified":"2025-02-19T16:15:48","modified_gmt":"2025-02-19T08:15:48","slug":"the-4-fundamental-principles-for-identity-and-privilege-security","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2025\/02\/the-4-fundamental-principles-for-identity-and-privilege-security\/","title":{"rendered":"The 4 Fundamental Principles for Identity and Privilege Security"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"104651\" class=\"elementor elementor-104651\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-25f39c1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25f39c1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-05f590f\" data-id=\"05f590f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6692190 elementor-widget elementor-widget-text-editor\" data-id=\"6692190\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"uui-text-rich-text-2 w-richtext\">\n\nIdentity and privilege management is a core pillar of modern cybersecurity. Gartner predicts that<strong> by 2025 more than 70% of security breaches will be related to credential abuse or poorly managed privileged access. <\/strong>That\u2019s a staggering risk\u2014one that organizations need to tackle head-on.\n\nThat\u2019s where the <strong><em>Four Rights to Secure Identity Privileges<\/em><\/strong> come in. This framework provides a clear, structured way to protect both human and machine identities.\n\n<strong>The four principles are:<\/strong>\n<ol role=\"list\">\n \t<li>Right Identity<\/li>\n \t<li>Right Reason<\/li>\n \t<li>Right Access<\/li>\n \t<li>Right Time<\/li>\n<\/ol>\nThese principles enforce the implementation of strict controls while keeping operations running smoothly. Let\u2019s break them down.\n<h2><strong>1. Right Identity: <\/strong>Making Sure the Right Person (or Machine) Has Access<\/h2>\nThis principle ensures that only verified and trustworthy identities\u2014whether human users or machine accounts like APIs and IoT devices\u2014can access critical systems and resources.\n\n<strong>The Challenge:<\/strong> False, duplicate, or poorly managed identities pose a significant risk. According to Gartner, <strong>25% of organizations struggle to maintain an accurate inventory of identities.<\/strong>\n\n<strong>The Solution:<\/strong> Use Identity Governance, Access Management, and <a href=\"https:\/\/senhasegura.com\/products\/mysafe\">Multi-Factor Authentication (MFA)<\/a> to continuously verify and manage identities.\n<h2><strong>2. Right Reason: <\/strong>Making Sure Access is Justified<\/h2>\nEven if the identity is trustworthy, validating the reason for access is essential. This principle reinforces that no resource should be accessed without a clear and legitimate justification.\n\n<strong>The Challenge:<\/strong> Unnecessary access to critical data is one of the most common causes of <a href=\"https:\/\/senhasegura.com\/post\/what-is-data-leak\">information leaks<\/a>. Gartner reports that <strong>organizations that don\u2019t implement purpose-based governance see 40% more <\/strong><a href=\"https:\/\/senhasegura.com\/post\/cyber-insurance-and-pam-costs\"><strong>compliance violations<\/strong><\/a><strong>.<\/strong>\n\n<strong>The Solution:<\/strong> Implement approval workflows and <a href=\"https:\/\/senhasegura.com\/post\/what-is-just-in-time-access\">Just-In-Time Access<\/a> policies to limit access based on actual business needs.\n<h2><strong>3. Right Access: <\/strong>Making Sure Privileges are Granted at the Correct Level<\/h2>\nThis principle ensures users only get the access they need\u2014nothing more. Overprovisioned accounts create massive security risks and increase potential damage in the <a href=\"https:\/\/senhasegura.com\/post\/what-is-data-breach\">event of a breach<\/a>.\n\n<strong>The Challenge:<\/strong> Many companies still rely on manual provisioning, which leads to mistakes and granting access beyond what is necessary.\n\n<strong>The Solution:<\/strong> Adopt <a href=\"https:\/\/senhasegura.com\/post\/principle-of-least-privilege\">Least Privilege Access<\/a> and automate access management to consistently reduce unnecessary privileges.\n<h2><strong>4. Right Time: <\/strong>Making Sure Access is Temporary<\/h2>\nTiming matters when it comes to access. Privileges should only be active when needed and removed once they\u2019re no longer required\u2014reducing risk and eliminating unnecessary permanent access.\n\n<strong>The Challenge:<\/strong> Many organizations fail to revoke access after projects end or employees leave. Gartner estimates that <strong>60% of human and machine identities have active permissions beyond the required time.<\/strong>\n\n<strong>The Solution:<\/strong> Implement Just in Time Access tools, continuous monitoring, and <a href=\"https:\/\/senhasegura.com\/post\/privileged-access-management-pam-a-complete-guide\">Privileged Access Management (PAM)<\/a> systems that automatically revoke expired access.\n<h2><strong>Securing Both Human and Machine Identities<\/strong><\/h2>\nWith the rise of automation, machine identities have grown exponentially. APIs, cloud workloads, and IoT devices often have more access than human users. <strong>Applying the Four Rights to both keeps security strong in a hybrid environment.<\/strong>\n<ul role=\"list\">\n \t<li><strong>For Human Identities: <\/strong>Focus on robust authentication, periodic privilege reviews, and security awareness training.<\/li>\n \t<li><strong>For Machine Identities:<\/strong> Use certificates, rotating API keys, and continuous behavior monitoring to track access.<\/li>\n<\/ul>\n<h2><strong>Conclusion<\/strong><\/h2>\n<strong>The <em>Four Rights to Secure Identity Privileges<\/em> aren\u2019t just a cybersecurity best practice\u2014they\u2019re a necessity. <\/strong>Organizations that follow these principles reduce risk, stay compliant, and create a more secure and efficient IT environment.\n\nBy applying these controls, you can strike the right balance between security, performance, and peace of mind\u2014knowing that both human and machine identities are managed responsibly.\n\n<strong>senhasegura PAM <\/strong>enforces the Four Rights by securing identities, automating access controls, and eliminating excessive privileges. With just-in-time access, real-time monitoring, and automated credential management, we help organizations reduce risk, maintain compliance, and streamline security operations.\n\n<strong>Get a firsthand look at how senhasegura protects your most critical assets<\/strong>\u2014<a href=\"https:\/\/senhasegura.com\/watch-demo\">see the solution in action<\/a>.\n\n<\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a3d4f6 elementor-widget elementor-widget-spacer\" data-id=\"6a3d4f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Identity and privilege management is a core pillar of m [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,1305,61],"tags":[420,1077],"class_list":["post-104651","post","type-post","status-publish","format-standard","hentry","category-segura","category-1305","category-press-release","tag-segura","tag-1077"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The 4 Fundamental Principles for Identity and Privilege Security - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The 4 Fundamental Principles for Identity and Privilege Security - Version 2\" \/>\n<meta property=\"og:description\" content=\"Identity and privilege management is a core pillar of m [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2025-02-25T08:06:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"250\" \/>\n\t<meta property=\"og:image:height\" content=\"70\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/fundamental-principles-for-identity-and-privilege-security#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/the-4-fundamental-principles-for-identity-and-privilege-security\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"The 4 Fundamental Principles for Identity and Privilege Security\",\"datePublished\":\"2025-02-25T08:06:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/the-4-fundamental-principles-for-identity-and-privilege-security\\\/\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"keywords\":[\"Segura\",\"2025\"],\"articleSection\":[\"Segura\",\"2025\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2025\\\/02\\\/the-4-fundamental-principles-for-identity-and-privilege-security\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/fundamental-principles-for-identity-and-privilege-security\",\"name\":\"The 4 Fundamental Principles for Identity and Privilege Security - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"datePublished\":\"2025-02-25T08:06:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/fundamental-principles-for-identity-and-privilege-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/post\\\/fundamental-principles-for-identity-and-privilege-security\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/post\\\/fundamental-principles-for-identity-and-privilege-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The 4 Fundamental Principles for Identity and Privilege Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The 4 Fundamental Principles for Identity and Privilege Security - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security","og_locale":"en_US","og_type":"article","og_title":"The 4 Fundamental Principles for Identity and Privilege Security - Version 2","og_description":"Identity and privilege management is a core pillar of m [&hellip;]","og_url":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security","og_site_name":"Version 2","article_published_time":"2025-02-25T08:06:48+00:00","og_image":[{"width":250,"height":70,"url":"https:\/\/version-2.com\/wp-content\/uploads\/2020\/04\/blog-v2-logo.jpg","type":"image\/jpeg"}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security#article","isPartOf":{"@id":"https:\/\/version-2.com\/2025\/02\/the-4-fundamental-principles-for-identity-and-privilege-security\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"The 4 Fundamental Principles for Identity and Privilege Security","datePublished":"2025-02-25T08:06:48+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2025\/02\/the-4-fundamental-principles-for-identity-and-privilege-security\/"},"wordCount":621,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"keywords":["Segura","2025"],"articleSection":["Segura","2025","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2025\/02\/the-4-fundamental-principles-for-identity-and-privilege-security\/","url":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security","name":"The 4 Fundamental Principles for Identity and Privilege Security - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"datePublished":"2025-02-25T08:06:48+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/post\/fundamental-principles-for-identity-and-privilege-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"The 4 Fundamental Principles for Identity and Privilege Security"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-rdV","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=104651"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104651\/revisions"}],"predecessor-version":[{"id":104656,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/104651\/revisions\/104656"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=104651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=104651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=104651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}