How to Implement Cloud Identity and Access Governance

Creating identity and access governance across cloud environments is crucial for modern organizations. In our previous post, we discussed how important human and non-human identities are for these environments and why their management and the governance of their access can be difficult. In the face of these challenges, our cloud identity and access governance (CIAG) […]

The post How to Implement Cloud Identity and Access Governance appeared first on Security Intelligence.

Continue reading How to Implement Cloud Identity and Access Governance

How to Create Identity and Access Governance In and Across Clouds

In March 2021, we posted a three-part series about whether cloud-native identity and access management (IAM) controls are good enough for an enterprise. Many of the points we raised at that time are still valid. However, the industry has developed and learned a lot since then. More companies and analysts now recognize cloud identity and […]

The post How to Create Identity and Access Governance In and Across Clouds appeared first on Security Intelligence.

Continue reading How to Create Identity and Access Governance In and Across Clouds

Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints

In many cases, one business unit sets up its own cloud-native identity and access management controls differently from another. One of your customers’ business units may need Red Hat, while another may need controls from a specific public cloud provider. The business unit may or may not be using the cloud-native identity and access management […]

The post Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints appeared first on Security Intelligence.

Continue reading Cloud-Native IAM Controls Part 3: Following Cloud Governance Blueprints

Cloud-Native IAM Controls Part 2: An Approach for Governance

Some organizations with multicloud environments opt for a cloud service provider with native identity access management (IAM). However, these same people often struggle when it comes to adding the cloud-native controls into a larger enterprise IAM program. In part 1 of our cloud-native IAM controls blog, we explored why these controls are not enough for […]

The post Cloud-Native IAM Controls Part 2: An Approach for Governance appeared first on Security Intelligence.

Continue reading Cloud-Native IAM Controls Part 2: An Approach for Governance

Who Goes There? The Art of Digital Identity and Access Management

To connect the real world to the digital world, we can create digital identity models that represent a person with different attributes, characteristics and goals.

The post Who Goes There? The Art of Digital Identity and Access Management appeared first on Security Intelligence.

Continue reading Who Goes There? The Art of Digital Identity and Access Management

What Is Transparency’s Role in Establishing Digital Trust With Consumers?

Transparency is a critical factor for consumers when establishing digital trust with companies and service providers due to increasing concerns about data privacy.

The post What Is Transparency’s Role in Establishing Digital Trust With Consumers? appeared first on Security Intelligence.

Continue reading What Is Transparency’s Role in Establishing Digital Trust With Consumers?

Identity and Access Management: Deciphering a Fluid Puzzle

The key to minimizing security vulnerabilities is the adoption of a layered cognitive approach to the wider identity and access management question.

The post Identity and Access Management: Deciphering a Fluid Puzzle appeared first on Security Intelligence.

Continue reading Identity and Access Management: Deciphering a Fluid Puzzle