
Sign up to save your podcasts
Or


Identity is no longer an IT admin task; it’s the security control plane.
In this episode of Access Granted, Britive’s Nauman Mustafa sits down with Sriram Santhanam, an experienced identity and security leader, to unpack where identity security is headed and what teams can do now.
What we cover:
Why static keys, blanket tokens, and over-permissive roles break in cloud + SaaS
Moving to runtime authorization: per-action access, short TTLs, ZSP by default
Non-human identities & agentic AI: on-behalf-of boundaries, tool allowlists, guardrails
Crawl-walk-run vs. run if you can: where to start and how to scale safely
IGA + PAM together: SailPoint governance with runtime enforcement for day-to-day access
Practical steps after SaaS/token incidents: review scopes, remove “full,” revoke fast, instrument audit
By BritiveIdentity is no longer an IT admin task; it’s the security control plane.
In this episode of Access Granted, Britive’s Nauman Mustafa sits down with Sriram Santhanam, an experienced identity and security leader, to unpack where identity security is headed and what teams can do now.
What we cover:
Why static keys, blanket tokens, and over-permissive roles break in cloud + SaaS
Moving to runtime authorization: per-action access, short TTLs, ZSP by default
Non-human identities & agentic AI: on-behalf-of boundaries, tool allowlists, guardrails
Crawl-walk-run vs. run if you can: where to start and how to scale safely
IGA + PAM together: SailPoint governance with runtime enforcement for day-to-day access
Practical steps after SaaS/token incidents: review scopes, remove “full,” revoke fast, instrument audit