See how organizations are integrating Generative AI into IAM tools to make identity governance tasks more intuitive and less resource intensive.
As Zero Trust Security Model mandates like AB 749 take hold in state agencies, learn how a modern IGA solution cost effectively closes the compliance gap.
As the danger of cyberattacks from both recognized hacker threats and unrecognized insider threats (e.g., employees, contractors, partners, etc.) increases, national and regional governments are mandating that agencies serving the public under their authority adopt a Zero Trust Security Model to help ensure the IT systems upon which the public relies remain operational.
One such measure, known as California Assembly Bill 749 (AB 749) has been adopted by the US state of California and put into effect on January 1, 2025. The law requires that every state agency implement security standards including multi-factor authentication, enterprise endpoint detection and response solutions, and robust logging practices. Further, the law requires agencies to follow uniform technology policies, standards, and procedures developed by the Chief of the Office of Information Security.
AB 749 is part of a trend toward Zero Trust Security Model mandates for both government-run agencies, businesses, and other organizations. In this post, we’ll define what a Zero Trust Security Model is and explain why it is foundational to an effective cybersecurity posture. We’ll provide a brief overview of the key provisions of AB 749, a timeline for compliance, and list the potential risks and consequences of non-compliance. Finally, you’ll learn how Modern Identity Governance & Administration (IGA) solutions—particularly Omada Identity Cloud — support Zero Trust Security Models, help organizations with compliance, and strengthen cybersecurity overall.
The Zero Trust Security Model is based on the principle of maintaining strict access controls and not trusting anyone by default, even those already inside the network perimeter. Implementing Zero Trust is critical for organizations that must manage identity security challenges associated with remote work, third-party integrations, and evolving attack vectors such as phishing, social engineering, compromised endpoints, and credential theft. The Zero Trust Security Model shifts from the starting point of trusting but verifying to a posture that “denies first” and sees everything and everyone as a threat. It actively governs permissions and continuously monitors activity.
AB 749 has been implemented to mitigate cybersecurity threats to state government networks that traditional “trust but verify” requirements fail to address. In the modern threat landscape hackers use tactics such as phishing to try and sometimes succeed in fraudulently meeting these requirements. It is also common for trusted individuals like employees and executives to use legitimate network access to steal and expose secure information.
AB 749 requires the California state government’s security architecture to authenticate and authorize every interaction between a network and a user or device and work on the ‘never trust, always verify’ principle that assumes that attacks will come both from within and outside of the network.
AB 749 require California state agencies to adopt certain cybersecurity standards and methodologies outlined in former US President Biden’s Executive Order (EO) 14028 on Improving the Nation’s Cybersecurity. On January 1, 2025, covered state entities must have implemented the following:
Non-compliance with these implementations would leave California responsible for all costs related to a potential breach or shutdown of a covered state entity’s systems. Cybersecurity breaches in critical computer systems operated by the state would likely have adverse consequences for public health, food assistance, labor and workforce development, and occupational licensing, to name a few. If these systems were disabled or malfunctioned as a result of a cyberattack, millions of vulnerable Californians and their families could be harmed.
Deploying a modern IGA solution is the least costly and disruptive way to create a mature Zero-Trust Security Model. The principal capabilities that a modern IGA solution supports to close a Zero-Trust implementation gap include:
A modern IGA solution identifies suspicious or unauthorized actions across the entire IT infrastructure.
When users change roles or responsibilities within an organization, a modern IGA solution helps administrators modify permissions more easily based on new requirements.
Role-based access control (RBAC) in a modern IGA solution enables organizations to assign permissions based on users’ roles and restrict access to what is sufficient to do their jobs.
When users require temporary elevated permissions to perform specific tasks, a modern IGA solution enables controlled privilege elevation mechanisms and eliminates the risk of permanently granting high-level access.
Automated tools and processes in a modern IGA solution provision and deprovision user accounts and their associated permissions. This reduces the risk of human error and ensures that access is granted or revoked consistently.
Omada Identity Cloud is a practical modern IGA solution that can help state agencies establish strong identity governance, meet compliance deadlines, and reduce risk. This next-generation IGA-as-a-service platform provides:
FEATURED RESOURCES
See how organizations are integrating Generative AI into IAM tools to make identity governance tasks more intuitive and less resource intensive.
Discover how AI is revolutionizing Identity and Access Management (IAM) with intelligent monitoring, NLP interfaces, and generative AI applications.
Identify and address the top 7 challenges hindering your identity access governance initiatives, and ensure sustainable and effective access to your data.
Let us show you how Omada can enable your business.