Cloud 101CircleEventsBlog
Join AT&T Cybersecurity in Chicago to learn top 2024 resilience tactics on May 21st!

Download Publication

SecaaS Category 1 // Identity and Access Management Implementation Guidance
SecaaS Category 1 // Identity and Access Management Implementation Guidance

SecaaS Category 1 // Identity and Access Management Implementation Guidance

Release Date: 09/26/2012

This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to those with the responsibility of designing, implementing and integrating the consumption of services of the IAM function within any cloud application of SecaaS.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Machine Identity in Cybersecurity and IAM
Machine Identity in Cybersecurity and IAM
What is IAM for the Cloud?
What is IAM for the Cloud?
IoT Controls Matrix v3
IoT Controls Matrix v3
Automation is Key: DHS Report Unveils Lessons from the Microsoft Exchange Incident
Automation is Key: DHS Report Unveils Lessons from the Microsoft Ex...
Published: 05/02/2024
Defining Cloud Key Management: 7 Essential Terms
Defining Cloud Key Management: 7 Essential Terms
Published: 05/01/2024
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t Be a Commodity
Upselling Cybersecurity: Why Baseline Security Features Shouldn’t B...
Published: 04/24/2024
Secure Your Kubernetes Environment by Enforcing Least Privilege
Secure Your Kubernetes Environment by Enforcing Least Privilege
Published: 04/24/2024

Acknowledgements

Luciano (J.R.) Santos
Luciano (J.R.) Santos
Chief Customer Officer, CSA

Luciano (J.R.) Santos

Chief Customer Officer, CSA

J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...

Read more

Aaron Alva Headshot Missing
Aaron Alva

Aaron Alva

Said Tabet Headshot Missing
Said Tabet

Said Tabet

Balaji Ramamoorthy Headshot Missing
Balaji Ramamoorthy

Balaji Ramamoorthy

Tim Brooks Headshot Missing
Tim Brooks

Tim Brooks

Michael Roza
Michael Roza
Head of Risk, Audit, Control and Compliance

Michael Roza

Head of Risk, Audit, Control and Compliance

Since 2012 Michael has contributed to over 100 CSA projects completed by CSA's Internet of Things, Zero Trust/Software-Defined Perimeter, Top Threats, Cloud Control Matrix, Containers/Microservices, DevSecOps, and other working groups. He has also served as co-chair of CSA's Enterprise Architecture, Top Threats, and Security-as-a-Service working groups while also serving as the Standards Liaison Officer for IoT, ICS, EA, SECaaS, and Cloud K...

Read more

Jim Brigham Headshot Missing
Jim Brigham

Jim Brigham

Ulrich Lang Headshot Missing
Ulrich Lang

Ulrich Lang

Kanchanna Balraj Headshot Missing
Kanchanna Balraj

Kanchanna Balraj

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Anish Mohammed Headshot Missing
Anish Mohammed

Anish Mohammed

Martin Antony Headshot Missing
Martin Antony

Martin Antony

Evan Scoboria Headshot Missing
Evan Scoboria
Technology Director, CSA

Evan Scoboria

Technology Director, CSA

Robert Polansky Headshot Missing
Robert Polansky

Robert Polansky

Sameer Anja Headshot Missing
Sameer Anja

Sameer Anja

Sundar Narayanswamy Headshot Missing
Sundar Narayanswamy

Sundar Narayanswamy

Kent Welch Headshot Missing
Kent Welch

Kent Welch

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Vicki Hahn Headshot Missing
Vicki Hahn

Vicki Hahn

Jean Pawluk Headshot Missing
Jean Pawluk

Jean Pawluk

John Linn Headshot Missing
John Linn

John Linn

Karen Lu HongQian Headshot Missing
Karen Lu HongQian

Karen Lu HongQian

Laura Robinson Headshot Missing
Laura Robinson

Laura Robinson

Sandeep Mittal Headshot Missing
Sandeep Mittal

Sandeep Mittal

Andrey Dulkin Headshot Missing
Andrey Dulkin

Andrey Dulkin

Valmiki Mukherjee Headshot Missing
Valmiki Mukherjee

Valmiki Mukherjee

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training