Zero trust hub /zero-trust/ Continuous Authentication /zero-trust/continuous-authentication/ Continuous authentication verifies identity throughout time Identity is essential to determining and establishing trust. It’s imperative to know who a user is and if they are authentic to confidently grant, renew, or deny access to any of an organization’s assets. Continuous authentication uses risk-based verification to confirm user identity on an ongoing basis, based on credentials and behaviors beyond the initial login. It compares a user’s historical behaviors to their current ones, and dynamically requests reauthentication as needed, in response to unexpected patterns of behavior. ​ Explore zero trust security /site/zero-trust/ _self #F4F4F3 Continuous authentication protects your organization Continuous authentication is a critical step in establishing a zero trust implementation. With automation and orchestration, continuous authentication can reduce security risk without placing undue burdens on tech teams or on end users. https://pubhub.devnetcloud.com/media/zero-trust-topic-hub/site/images/impl-verify.svg Confidently verify users Compare multiple credentials and behaviors to gain a deeper understanding of users and how they use your systems. https://pubhub.devnetcloud.com/media/zero-trust-topic-hub/site/images/impl-secure.svg Reduce security vulnerability Intelligent user authentication makes it harder for bad actors to penetrate your attack surface. https://pubhub.devnetcloud.com/media/zero-trust-topic-hub/site/images/impl-friction.svg Low friction for users Continuous authentication primarily occurs behind the scenes. This reduces the impact of security practices on user productivity. Implementing continuous authentication Enforce secure application access with SSO and MFA Passwordless authentication allows you to improve user productivity while reducing security risk. With single sign-on (SSO), consolidate app login workflows to one set of credentials, then protect that access point with a strong multi-factor authentication (MFA) process that supports continuous application access. Lab: Application-first security with Cisco and AWS https://developer.cisco.com/learning/tracks/cisco-app-first-security/cisco-app-first-security-lab/ Sandbox: Secure a cloud-native application https://devnetsandbox.cisco.com/RM/Diagram/Index/88e9fabf-abbf-4c0b-b1a1-c4999d794a10?diagramType=Topology https://pubhub.devnetcloud.com/media/zero-trust-topic-hub/site/images/community-bg.jpg Join our developer security community For your toughest security challenges, Cisco APIs & SDKs, and technology solutions for your business problems. ​ Join our community for free https://community.cisco.com/t5/developer-security/ct-p/j-developer-security