ChaptersEventsBlog
Prove your skills in Illumiverse Labs’ Breach Containment CTF. Register now to stop attackers.

Download Publication

The 2020 State of Identity Security in the Cloud
The 2020 State of Identity Security in the Cloud

The 2020 State of Identity Security in the Cloud

Release Date: 11/19/2020

Working Group: Security as a Service

The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises digital transformations are on an accelerated track to enable employees to work from home. CSA surveyed these organizations to better understand how cloud services are being used during this transition and how organizations are securing their operations over the next 12 months.


Goals of the study:

 • Determine the use and challenges of public cloud workloads today and 1 year from now
 • Understand cloud IAM challenges specifically human and machine identity challenges
 • Establish the anticipated methods of addressing cloud IAM challenges
 • Identify the teams and roles responsible for cloud IAM 
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Beyond the Hype: A Benchmark Study of AI Agents in the SOC
Beyond the Hype: A Benchmark Study of AI Agents...
SaaS Security Capability Framework (SSCF)
SaaS Security Capability Framework (SSCF)
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach
When OAuth Tokens Go Rogue: Lessons from the Salesloft–Drift Breach
Published: 10/08/2025
How Event-Based Identity Management Can Enable Dynamic Security
How Event-Based Identity Management Can Enable Dynamic Security
Published: 10/08/2025
Role Engineering for Modern Access Control
Role Engineering for Modern Access Control
Published: 10/01/2025
Zero Trust Architecture: Principle Driven Security Strategy for Organizations and Security Leaders
Zero Trust Architecture: Principle Driven Security Strategy for Org...
Published: 09/30/2025

Acknowledgements

John Yeoh
John Yeoh
Chief Scientific Officer, CSA

John Yeoh

Chief Scientific Officer, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Sean Heide
Sean Heide

Sean Heide

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Justyna Kucharczak Headshot Missing
Justyna Kucharczak

Justyna Kucharczak

Hillary Baron
Hillary Baron
AVP of Research, CSA

Hillary Baron

AVP of Research, CSA

Alex Kaluza
Alex Kaluza
Research Analyst, CSA

Alex Kaluza

Research Analyst, CSA

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training