Cloud Infrastructure Entitlements Management (CIEM) & Identity Management For Beginners
Security Boulevard, August 31st, 2021
September 12, 2021,
Volume 282, Issue 2

The public cloud eliminated traditional network boundaries, so cloud security is based on different strategies, like entitlement management

"The security boundary of your cloud is your Identities," writes Eric Kedrosky in Security Boulevard, "both people users and non-people identities, and they need to be managed accordingly. There can be tens of thousands of non-people identities in your cloud environment, and it is the use cases of these non-people identities make security even more complex.

Identity-based use cases are proliferating dramatically, which brings into question their entitlements. In the cloud, we call these entitlements an Identity's Effective Permissions, the end-to-end permission of the actions that an Identity can take and the data it can access..."

Read More ...

Keywords:

 
Other articles in the IT News - Security section of Volume 282, Issue 2:

See all archived articles in the IT News - Security section.