Download Publication
Who it's for:
- IAM Program Leads
- Security Operations Teams
- CISOs and other senior leadership
What is IAM for the Cloud?
Release Date: 07/12/2023
Working Group: Identity and Access Management
- The benefits of moving to the cloud and why you should consider it
- The factors that affect IAM and how IAM has evolved to solve them
- How IAM is different in cloud environments compared to on-prem
- The challenges faced by organizations when adopting IAM for the cloud
- Considerations and best practices for an effective cloud IAM program
- Tips for communicating the value of IAM
Download this Resource
Acknowledgements
David Strommer
Venkat Raghavan
Faye Dixon
Ryan Gifford
Research Analyst, CSA
Alon Nachmany
Alon Nachmany is a highly accomplished cybersecurity professional with over 20 years of experience in the industry. He is recognized as a thought leader in the field and has been named one of the top 40 under 40 in cybersecurity by Top Cyber News Magazine. Additionally, Alon serves as a Board Member for multiple organizations.
Throughout his career, Alon has led teams and delivered global safeguards to Fortune 100 partners across a wi...
Heinrich Smit
CISO & Risk Management at Semperis
Heinrich is a recognized Information Protection and Zero Trust expert who started out in Law, and pivoted to his love of technology during the Tech Boom. He has led teams at software innovators and large financial institutions, has authored entire Information Security Policy stores, and has protected data at both 280,000 seat regulated enterprises and SAAS-based startup unicorns. He is passionate about Privacy and Zero Trust, as well as Def...
Shruti Kulkarni
Information Security Architect, Elexon
I am a security professional with experience across various domains of security. I work in defining organisation’s security strategy, security architecture and security practices. Translating business objectives and risk management strategies into specific security processes enabled by security technologies and services. I work on gap analysis, design, implementation and...
Ravi Erukulla
Ravi Erukulla is a long-time Identity Security enthusiast and is particularly passionate about simplifying the way Identity Security products are built and adopted. Ravi brings two decades of industry experience in identity, security, and technology solutions. In his current role as VP of Analyst Relations and Customer Advocacy at Saviynt, Ravi is responsible for driving analyst relations, industry alliance partnerships, and customer advoca...
Ramesh Gupta
Ramesh has 20+ years of experience in IT industry serving various industries such as Financials, Manufacturing and Healthcare and across different service lines such as Applications, Infrastructure and Cloud Services as Director / Client Delivery Executive / Senior Project / Program / Portfolio Manager. In his latest role as Director of Cybersecurity at NTT Data Services, he is responsible for digital offering development across IAM / App S...
Jonathan Flack
Principal Architect, Cloud & Security Architecture. Under contract to the Department of the Air Force
Jonathan Flack is a 30 year veteran engineer with extensive expertise in large scale distributed systems and security, serving in Principal or Executive roles. In addition to retaining hands on keyboard with his team, notable areas of focus include NIST 800-63, NIST 800-218 and NIST 800-207 (Zero Trust), software supply chain, and various governance compliance regimes. Recent work includes direct collaboration with the US Department of Defe...
Interested in helping develop research with CSA?
Related Certificates & Training
Learn the core concepts, best practices and recommendation for securing an organization on the cloud regardless of the provider or platform. Covering all 14 domains from the CSA Security Guidance v4, recommendations from ENISA, and the Cloud Controls Matrix, you will come away understanding how to leverage information from CSA's vendor-neutral research to keep data secure on the cloud.
Learn moreFor those who want to learn from the industry's first benchmark for measuring Zero Trust skill sets, the CCZT includes foundational Zero Trust components released by CISA and NIST, innovative work in the Software-Defined Perimeter by CSA Research, and guidance from renowned Zero Trust experts such as John Kindervag, Founder of the Zero Trust philosophy.
Learn more