Welcome!

Cloud Security Authors: Bob Gourley, Elizabeth White, Pat Romanski, Harry Trott, Peter Silva

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Cloud Security

@CloudExpo: Article

Identity and Access Management in the Cloud

Many companies are beginning to realize that cloud services can often be more secure than in-house data centers

In today's business world, data is the lifeblood of most organizations. As such, it has become a prime target for both external and internal threats. Data breaches made plenty of headlines in 2011 and don't show any signs of slowing down. In fact, a recent report from Privacy Rights Clearinghouse found that there were 535 data breaches reported last year alone. Whether it is for a Fortune 500 business, a university or a midmarket company, the protection of sensitive information is not only important for daily business functions, but is now a security measure required by law. As organizations of all sizes - not just large enterprises - struggle to keep up with evolving security and compliance requirements, many are turning to identity and access management (IAM) solutions to meet their needs.

Unlike traditional IT security technologies, which focus on perimeter and end-point threats, IAM solutions focus on identity lifecycles and access controls, as well as provisioning, authentication, certification and other identity-based processes. Previously seen as a luxury only available to the largest of organizations, cloud computing has increased the accessibility of IAM solutions for businesses of all sizes at a time when they are needed most. In addition, cloud computing provides the opportunity for security vendors to bring mature IAM technology to smaller businesses via a new deployment model - without starting from scratch and losing years of successful development.

Bringing SaaS into the IAM Fold
Originally hesitant to put sensitive data in the cloud, many companies are beginning to realize that cloud services can often be more secure than in-house data centers, as they are held to service level agreements (SLAs) and other third-party regulations. As such, more organizations are now readily adopting Software-as-a-Service (SaaS) and cloud solutions to maximize efficiencies, lower total cost of ownership and ultimately "do more with less." How? Cloud-based IAM solutions can be deployed at a fraction of the time and cost of on-premise infrastructure. In addition, because cloud-based solutions are often much easier to use and manage, IT managers can focus on tasks that are more central to business goals rather than spending their resources trying to manage complex on-premise infrastructure.

For many organizations, the strategy for growth over the next couple of years will be heavily focused on expanding and optimizing their extranet community - SaaS providers, cloud service providers, supply chain partners, resellers, integrators and other business partners. The question now becomes how to secure these SaaS-based applications, cloud services and other third-party systems. Having a strategy for external audiences' identities and entitlements - in addition to internal employees - as well as visibility into all identity data is critical to a business's future success. Enter federation.

Federation, which enables companies to extend IAM capabilities to third-party applications and securely share identity information with external audiences, is becoming an increasingly strategic business tool. Two of the most common federated IAM capabilities are Federated Single Sign-On (FSSO) and federated user provisioning.

  • Federated Single Sign-On (FSSO): FSSO capabilities allow a company's user base to access applications while avoiding the need to transmit shared secrets, such as passwords, to third parties - mitigating the risk of important credentials being compromised. FSSO also allows the user to log in to all applications in a uniform way regardless of whether they are housed internally or hosted by an external partner. The flip side of this capability is that the business can also safely provide authorized third parties with access to their applications. Using an industry-proven means of providing SSO capabilities to third parties - rather than using an in-house grown solution that hasn't been vetted or tested - can help companies strengthen security and increase compliance while improving productivity by eliminating password reset requests and other associated help desk calls.
  • Federated User Provisioning: Federated user provisioning allows third-party applications to be included in the same identity and lifecycle process as internal applications. With the use of secure and open-standard protocols, organizations can seamlessly exchange identity data with partners and SaaS providers as well as provision users, roles and entitlements to external applications. Equally as important, using federated user provisioning, companies can also ensure that user role and entitlement information found on third-party systems is timely and accurate, mitigating the risk of important data being accessed by unauthorized users.

At the onset of widespread SaaS adoption, many companies did not consider external applications part of their network infrastructure - and so provisioning and other IAM capabilities were focused on on-premise systems only. As more and more critical data and applications become housed in the cloud, eschewing security liability for systems and information residing outside a company's four walls is a critical and common mistake.

Provisioning encompasses managing role data and access rights throughout a user's life cycle - from onboarding, transfers and promotions to the day they leave the company - and must be applied to both on- and off-premise systems in a timely and accurate manner in order to ensure proper access to important data. Otherwise, companies open themselves up to a variety of dangers, including data breaches, increased IT costs and compliance risks.

For example, effectively deprovisioning a user when they are no longer authorized to access certain resources is just as important as giving them access at the start of an identity life cycle. Failure to deprovision users who have left a company can result in orphan accounts, opening the organization up to a number of potential issues. Compliance requirements aside, ex-employees who still have access to SaaS or on-premise applications can potentially harvest corporate and client information for nefarious purposes. In other cases, it's important to have up-to-date entitlement information when users simply change position or are given different responsibilities. Otherwise, these events can lead to "entitlement sprawl" wherein users accumulate privileges that are no longer necessary for their jobs. In the age of the data breach, IAM solutions are more than just another add-on for a business's security infrastructure. An effective IAM solution will protect sensitive data, help to avoid complications in daily business operations, minimize potential legal woes and ensure a strong reputation among customers.

Conclusion
As technologies, such as mobile devices and social networking sites, continue to further convolute the security landscape, more and more critical assets are being placed outside a company's four walls. In order to put their security measures closer to these assets, many companies are implementing cloud-based solutions. Proficient cloud-based IAM tools can help companies strengthen security and increase compliance while benefiting from unparalleled savings, quick time-to-deployment and greater business efficiencies - a win-win for all involved.

More Stories By Eric Z. Maass

Eric Maass is the chief technology officer at Lighthouse Security Group, where he’s responsible for the roadmap and technology vision for the company’s flagship product, Lighthouse Gateway, a cloud-based identity and access management platform. Maass was formerly the chief security architect for the U.S. Air Force’s Global Combat Support System, where he was responsible for the architecture and design of its net-centric IAM infrastructure.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
IoT solutions exploit operational data generated by Internet-connected smart “things” for the purpose of gaining operational insight and producing “better outcomes” (for example, create new business models, eliminate unscheduled maintenance, etc.). The explosive proliferation of IoT solutions will result in an exponential growth in the volume of IoT data, precipitating significant Information Governance issues: who owns the IoT data, what are the rights/duties of IoT solutions adopters towards t...
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
"Dice has been around for the last 20 years. We have been helping tech professionals find new jobs and career opportunities," explained Manish Dixit, VP of Product and Engineering at Dice, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
"At ROHA we develop an app called Catcha. It was developed after we spent a year meeting with, talking to, interacting with senior citizens watching them use their smartphones and talking to them about how they use their smartphones so we could get to know their smartphone behavior," explained Dave Woods, Chief Innovation Officer at ROHA, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2017 New York. The 20th Cloud Expo and 7th @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, NY. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Internet to enable us all to im...
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band-aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It does...
"ReadyTalk is an audio and web video conferencing provider. We've really come to embrace WebRTC as the platform for our future of technology," explained Dan Cunningham, CTO of ReadyTalk, in this SYS-CON.tv interview at WebRTC Summit at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.