Cloud 101CircleEventsBlog
CSA's Continuous Audit Metrics Working Group is expanding! Help shape the future of cloud assurance.

Download Publication

What is IAM for the Cloud?
What is IAM for the Cloud?

What is IAM for the Cloud?

Release Date: 07/12/2023

The purpose of this document is to provide an understanding of the challenges and considerations involved in managing Identity and Access Management (IAM) in the cloud, as well as the importance of IAM to an organization's overall security strategy.


Traditionally, IAM was intended as a general purpose mechanism to restrict and control access to enterprise resources by granting permissions to users or groups or users. The goal was entitlement, not so much control, and access was based entirely on assertions of username and password, coupled with group membership or permissions directly assigned at the resource. This model later evolved to centralize IAM, and access decisions were concentrated centrally at an authority such as a service, server, or Identity infrastructure. The threat landscape has materially changed over the years, and today, IAM is a core component of any digital access model. It evolves to employ ever-increasing visibility, granularity, and control as the nature of users, resources, and systems change.




Download this Resource

Bookmark
Share
View translations
Related resources
The Six Pillars of DevSecOps - Collaboration and Integration
The Six Pillars of DevSecOps - Collaboration an...
The State of Security Remediation 2024
The State of Security Remediation 2024
Key Management Lifecycle Best Practices
Key Management Lifecycle Best Practices
How To Secure Your AWS Environment: Six Best Practices
How To Secure Your AWS Environment: Six Best Practices
Published: 03/01/2024
To Meet Bold Ambitions and Combat Mounting Threats, Australia Endorses Zero Trust
To Meet Bold Ambitions and Combat Mounting Threats, Australia Endor...
Published: 02/28/2024
Securing Your Microsoft Environment After the Midnight Blizzard Attack
Securing Your Microsoft Environment After the Midnight Blizzard Attack
Published: 02/27/2024
The Hidden Certificates in Your Organization: How to Find Them
The Hidden Certificates in Your Organization: How to Find Them
Published: 02/26/2024

Acknowledgements

Heinrich Smit
Heinrich Smit
Governance, Risk & Compliance at Semperis

Heinrich Smit

Governance, Risk & Compliance at Semperis

Heinrich is a recognized Information Protection and Zero Trust expert who started out in Law, and pivoted to his love of technology during the Tech Boom. He has led teams at software innovators and large financial institutions, has authored entire Information Security Policy stores, and has protected data at both 280,000 seat regulated enterprises and SAAS-based startup unicorns. He is passionate about Privacy and Zero Trust, as well as Def...

Read more

Shruti Kulkarni
Shruti Kulkarni
Cyber Security Architect at 6point6

Shruti Kulkarni

Cyber Security Architect at 6point6

I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...

Read more

Ravi Erukulla
Ravi Erukulla

Ravi Erukulla

Ravi Erukulla is a long-time Identity Security enthusiast and is particularly passionate about simplifying the way Identity Security products are built and adopted. Ravi brings two decades of industry experience in identity, security, and technology solutions. In his current role as VP of Analyst Relations and Customer Advocacy at Saviynt, Ravi is responsible for driving analyst relations, industry alliance partnerships, and customer advoca...

Read more

Ramesh Gupta
Ramesh Gupta

Ramesh Gupta

Ramesh has 20+ years of experience in IT industry serving various industries such as Financials, Manufacturing and Healthcare and across different service lines such as Applications, Infrastructure and Cloud Services as Director / Client Delivery Executive / Senior Project / Program / Portfolio Manager. In his latest role as Director of Cybersecurity at NTT Data Services, he is responsible for digital offering development across IAM / App S...

Read more

Jonathan Flack Headshot Missing
Jonathan Flack

Jonathan Flack

Jonathan Flack is a 30 year veteran engineer with extensive expertise in large scale distributed systems and security, serving in Principal or Executive roles. In addition to retaining hands on keyboard with his team, notable areas of focus include NIST 800-63, NIST 800-218 and NIST 800-207 (Zero Trust), software supply chain, and various governance compliance regimes. Recent work includes direct collaboration with the US Department of Defe...

Read more

David Strommer Headshot Missing
David Strommer

David Strommer

This person does not have a biography listed with CSA.

Venkat Raghavan Headshot Missing
Venkat Raghavan

Venkat Raghavan

This person does not have a biography listed with CSA.

Faye Dixon Headshot Missing
Faye Dixon

Faye Dixon

This person does not have a biography listed with CSA.

Ryan Gifford
Ryan Gifford
Research Analyst, CSA

Ryan Gifford

Research Analyst, CSA

This person does not have a biography listed with CSA.

Alon Nachmany
Alon Nachmany

Alon Nachmany

Alon Nachmany is a highly accomplished cybersecurity professional with over 20 years of experience in the industry. He is recognized as a thought leader in the field and has been named one of the top 40 under 40 in cybersecurity by Top Cyber News Magazine. Additionally, Alon serves as a Board Member for multiple organizations.

Throughout his career, Alon has led teams and delivered global safeguards to Fortune 100 partners across a wi...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training