Cloud 101CircleEventsBlog
Register for CSA’s free Virtual Cloud Trust Summit to tackle enterprise challenges in cloud assurance.

Download Publication

SecaaS Category 1 // Identity and Access Management Implementation Guidance
SecaaS Category 1 // Identity and Access Management Implementation Guidance

SecaaS Category 1 // Identity and Access Management Implementation Guidance

Release Date: 09/26/2012

This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to those with the responsibility of designing, implementing and integrating the consumption of services of the IAM function within any cloud application of SecaaS.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Machine Identity in Cybersecurity and IAM
Machine Identity in Cybersecurity and IAM
Defining Shadow Access: The Emerging IAM Security Challenge
Defining Shadow Access: The Emerging IAM Securi...
The Risk and Impact of Unauthorized Access to Enterprise Environments
The Risk and Impact of Unauthorized Access to Enterprise Environments
Published: 05/17/2024
Securing Generative AI with Non-Human Identity Management and Governance
Securing Generative AI with Non-Human Identity Management and Gover...
Published: 05/16/2024
Navigating Cloud Security Best Practices: A Strategic Guide
Navigating Cloud Security Best Practices: A Strategic Guide
Published: 05/15/2024
The Importance of Securing Your Organization Against Insider and Offboarding Risks
The Importance of Securing Your Organization Against Insider and Of...
Published: 05/14/2024

Acknowledgements

Luciano (J.R.) Santos
Luciano (J.R.) Santos
Chief Customer Officer, CSA

Luciano (J.R.) Santos

Chief Customer Officer, CSA

J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...

Read more

Aaron Alva Headshot Missing
Aaron Alva

Aaron Alva

Said Tabet Headshot Missing
Said Tabet

Said Tabet

Balaji Ramamoorthy Headshot Missing
Balaji Ramamoorthy

Balaji Ramamoorthy

Tim Brooks Headshot Missing
Tim Brooks

Tim Brooks

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional

Michael Roza

Risk, Audit, Control and Compliance Professional

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jim Brigham Headshot Missing
Jim Brigham

Jim Brigham

Ulrich Lang Headshot Missing
Ulrich Lang

Ulrich Lang

Kanchanna Balraj Headshot Missing
Kanchanna Balraj

Kanchanna Balraj

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Anish Mohammed Headshot Missing
Anish Mohammed

Anish Mohammed

Martin Antony Headshot Missing
Martin Antony

Martin Antony

Evan Scoboria Headshot Missing
Evan Scoboria
Technology Director, CSA

Evan Scoboria

Technology Director, CSA

Robert Polansky Headshot Missing
Robert Polansky

Robert Polansky

Sameer Anja Headshot Missing
Sameer Anja

Sameer Anja

Sundar Narayanswamy Headshot Missing
Sundar Narayanswamy

Sundar Narayanswamy

Kent Welch Headshot Missing
Kent Welch

Kent Welch

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Vicki Hahn Headshot Missing
Vicki Hahn

Vicki Hahn

Jean Pawluk Headshot Missing
Jean Pawluk

Jean Pawluk

John Linn Headshot Missing
John Linn

John Linn

Karen Lu HongQian Headshot Missing
Karen Lu HongQian

Karen Lu HongQian

Laura Robinson Headshot Missing
Laura Robinson

Laura Robinson

Sandeep Mittal Headshot Missing
Sandeep Mittal

Sandeep Mittal

Andrey Dulkin Headshot Missing
Andrey Dulkin

Andrey Dulkin

Valmiki Mukherjee Headshot Missing
Valmiki Mukherjee

Valmiki Mukherjee

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training