SSF, CAEP, RISC, and SCIM Events: Zero Trust signaling standards

SSF, CAEP, RISC, and SCIM Events: the standards turning Zero Trust from a principle into a reality

A practical breakdown of how SSF, CAEP, RISC, and SCIM Events work together to close the gap between Zero Trust as a principle and Zero Trust as a functioning architecture.

March 5, 2026 · 6 min · 1172 words · Prithvi Poreddy

When SaaS Vendors Control Your Identity: Email Serves Two Masters

Practical strategies for maintaining immutable identifier architecture internally while working within SaaS platform constraints that require email as the primary identifier.

November 19, 2025 · 4 min · 785 words · Prithvi Poreddy

Stop Treating Email Addresses as Identifiers

Email addresses as identifiers create security risks, audit gaps, and technical debt. Learn the three-layer approach to proper identity management.

November 8, 2025 · 6 min · 1118 words · Prithvi Poreddy

Access Reviews Are Broken: How to Fix Them

A practical guide to redesigning access reviews that actually reduce risk by aligning with how people think and work, not just compliance checkboxes.

October 11, 2025 · 6 min · 1122 words · Prithvi Poreddy

UTCP, MCP, and the Missing Identity Layer

An analysis of how UTCP and MCP both fail to address the fundamental challenge of identity and trust for AI agents, and what’s needed to fix it.

October 10, 2025 · 6 min · 1270 words · Prithvi Poreddy
Zoomed image