Managing Cloud Identities in Hybrid Cloud

As companies add more cloud services to their IT environments, the process of managing identities is getting more complex . When companies use cloud services — services they don’t control themselves — they still must develop sound policies around role-based access. They still must grant rights to users who need information to get work done, and they must be able to automatically take away those privileges when people leave a company or change roles. On top of it all, companies using cloud services are also bound by any compliance rules that govern their identity and access management (IAM) initiatives.

Businesses now have to deal with a collection of cloud services, that hold sensitive data obtained from new logins and proprietary connector APIs that often don’t work well with internal IAM systems.

Read more

Challenges of Identity and Access Management in the Cloud

Cloud Computing has completely changed the way Identity and Access Management (IAM) is performed in organizations who operate on the cloud. A few years ago, the typical scenario would have been the IT department giving remote access to specific people and only for a few applications. This has changed now, with the employees accessing company resources from their personal devices over unsecure networks.

In order to protect their assets, the security measures should include encryption, logging and monitoring, role-based access control and more. The Cloud SaaS, PaaS and IaaS services offered by Azure and Amazon Web Services, has mandated that the organizations integrate the IAM practices, processes and procedures in a scalable, effective and efficient manner.

Read more