Download Publication
Who it's for:
- IAM Program Leads
- Security Leads
Defining Shadow Access: The Emerging IAM Security Challenge
Release Date: 09/12/2023
Working Group: Identity and Access Management
Shadow Access is unmonitored, unauthorized, invisible, unsafe, and generally over-permissioned cloud access. This emerging Identity and Access Management (IAM) security challenge has arisen with the growth of cloud computing, DevOps, cloud native architectures, and data sharing. An increased use of access and entitlements that connect cloud services together, coupled with automated infrastructure and software development, results in incorrectly or unexpectedly permissioned accounts and resources.
The consequences of Shadow Access are massive and threaten to impact any organization that has an evolving cloud. This short IAM security document summarizes the background, causes, and impact of Shadow Access, as well as outlining the path forward to regain the benefits of a dynamic and secure cloud environment.
Key Takeaways:
- The background and definition of Shadow Access
- What causes Shadow Access, including the complexity and process changes
- The impacts of Shadow Access
Download this Resource
Prefer to access this resource without
an account?
Download the publication. Download the presentation.
Are you a research volunteer? Request to have your profile displayed on the website here.
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn more
Learn more
For those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more
Learn more