Cloud 101CircleEventsBlog

Download Publication

The 2020 State of Identity Security in the Cloud - Chinese Translation
The 2020 State of Identity Security in the Cloud - Chinese Translation

The 2020 State of Identity Security in the Cloud - Chinese Translation

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].

The use of cloud services have continued to increase over the past decade. Particularly in the wake of the COVID-19 public health crisis, many enterprises digital transformations are on an accelerated track to enable employees to work from home. CSA surveyed these organizations to better understand how cloud services are being used during this transition and how organizations are securing their operations over the next 12 months.


Goals of the study:

 • Determine the use and challenges of public cloud workloads today and 1 year from now
 • Understand cloud IAM challenges specifically human and machine identity challenges
 • Establish the anticipated methods of addressing cloud IAM challenges
 • Identify the teams and roles responsible for cloud IAM 
Download this Resource

Prefer to access this resource without an account? Download it now.

Share
View translations
Related resources
Agile Data Lake Threat Modeling
Agile Data Lake Threat Modeling
Data Loss Prevention and Data Security Survey Report
Data Loss Prevention and Data Security Survey R...
The Six Pillars of DevSecOps - Pragmatic Implementation
The Six Pillars of DevSecOps - Pragmatic Implem...
Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now
Compromise Detection vs. Threat Detection: Why ‘Right of Boom’ Now
Published: 05/30/2023
What Are the 5 Key Areas of Cloud Security
What Are the 5 Key Areas of Cloud Security
Published: 05/30/2023
The Top 5 Cloud Security Risks of 2023 (So Far)
The Top 5 Cloud Security Risks of 2023 (So Far)
Published: 05/30/2023
5 Essential Components of a Cloud DLP Solution
5 Essential Components of a Cloud DLP Solution
Published: 05/23/2023
How to Fortify Your Salesforce Ecosystem Security
How to Fortify Your Salesforce Ecosystem Security
June 20 | TBD
5 Ways Access Management Goes Awry in AWS
5 Ways Access Management Goes Awry in AWS
June 28 | TBD
Zero Trust & Cloud Security Meetup + Mission Critical Summit On Demand
Zero Trust & Cloud Security Meetup + Mission Critical Summit On Demand
July 11 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training