Cloud 101CircleEventsBlog
Save the date for CSA's 2024 Cyber Monday Sale: Get 50% off the exam token bundle!

Download Publication

SecaaS Category 1 // Identity and Access Management Implementation Guidance
SecaaS Category 1 // Identity and Access Management Implementation Guidance

SecaaS Category 1 // Identity and Access Management Implementation Guidance

Release Date: 09/26/2012

Working Group: Security as a Service

This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to those with the responsibility of designing, implementing and integrating the consumption of services of the IAM function within any cloud application of SecaaS.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Identity and Access Management Working Group Charter 2024
Identity and Access Management Working Group Ch...
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Beyond Passwords: The Role of Passkeys in Modern Web Security
Beyond Passwords: The Role of Passkeys in Moder...
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Zero Standing Privileges (ZSP): Vendor Myths vs. Reality
Published: 11/15/2024
Non-Human Identity Management Program: Guide Step-by-Step
Non-Human Identity Management Program: Guide Step-by-Step
Published: 11/14/2024
What Do the New NIST Password Guidelines Mean for Cloud Security?
What Do the New NIST Password Guidelines Mean for Cloud Security?
Published: 11/13/2024
What is Cloud Workload in Cloud Computing?
What is Cloud Workload in Cloud Computing?
Published: 11/13/2024

Acknowledgements

Luciano (J.R.) Santos
Luciano (J.R.) Santos
Chief Customer Officer, CSA

Luciano (J.R.) Santos

Chief Customer Officer, CSA

J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...

Read more

Aaron Alva Headshot Missing
Aaron Alva

Aaron Alva

Said Tabet Headshot Missing
Said Tabet

Said Tabet

Balaji Ramamoorthy Headshot Missing
Balaji Ramamoorthy

Balaji Ramamoorthy

Tim Brooks Headshot Missing
Tim Brooks

Tim Brooks

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jim Brigham Headshot Missing
Jim Brigham

Jim Brigham

Ulrich Lang Headshot Missing
Ulrich Lang

Ulrich Lang

Kanchanna Balraj Headshot Missing
Kanchanna Balraj

Kanchanna Balraj

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Anish Mohammed Headshot Missing
Anish Mohammed

Anish Mohammed

Martin Antony Headshot Missing
Martin Antony

Martin Antony

Evan Scoboria Headshot Missing
Evan Scoboria
Technology Director, CSA

Evan Scoboria

Technology Director, CSA

Robert Polansky Headshot Missing
Robert Polansky

Robert Polansky

Sameer Anja Headshot Missing
Sameer Anja

Sameer Anja

Sundar Narayanswamy Headshot Missing
Sundar Narayanswamy

Sundar Narayanswamy

Kent Welch Headshot Missing
Kent Welch

Kent Welch

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Vicki Hahn Headshot Missing
Vicki Hahn

Vicki Hahn

Jean Pawluk Headshot Missing
Jean Pawluk

Jean Pawluk

John Linn Headshot Missing
John Linn

John Linn

Karen Lu HongQian Headshot Missing
Karen Lu HongQian

Karen Lu HongQian

Laura Robinson Headshot Missing
Laura Robinson

Laura Robinson

Sandeep Mittal Headshot Missing
Sandeep Mittal

Sandeep Mittal

Andrey Dulkin Headshot Missing
Andrey Dulkin

Andrey Dulkin

Valmiki Mukherjee Headshot Missing
Valmiki Mukherjee

Valmiki Mukherjee

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training