Cloud Infrastructure Entitlements Management (CIEM) & Identity Management For Beginners
Security Boulevard, August 31st, 2021
September 12, 2021,
Volume 282, Issue 2

"The security boundary of your cloud is your Identities," writes Eric Kedrosky in Security Boulevard, "both people users and non-people identities, and they need to be managed accordingly. There can be tens of thousands of non-people identities in your cloud environment, and it is the use cases of these non-people identities make security even more complex.

Identity-based use cases are proliferating dramatically, which brings into question their entitlements. In the cloud, we call these entitlements an Identity's Effective Permissions, the end-to-end permission of the actions that an Identity can take and the data it can access..."

Read More ...

Keywords:

 
Other articles in the IT News - Security section of Volume 282, Issue 2:

See all archived articles in the IT News - Security section.