43% of respondents admitted they do not change their credentials in the cloud as frequently as they do on premises.
We asked Forrester Research for their impressions about the future of cloud security and the particular challenges of managing privileged identities in the cloud.
Each piece of the IAAS puzzle has a Privileged Identity Management element to it that has not changed from its on-premises equivalent deployment.
Can IaaS (Infrastructure as a Service) itself be used to manage some intrinsic privileges, or is a third party Privileged Identity Management (PIM) solution required? And where are there overlaps?
Making privileged access a moving target helps mitigate threats in the cloud.
While the traditional IT groups are getting gutted by the cloud, which the board and execs see as a cost panacea, security is in a position to get a windfall. The number one concern about cloud remains security.
If you can build your Identity and Access Management program around ensuring proper and efficient end user access, keeping privileged access in check, and treating IAM as the organization’s perimeter defense, then you will get all the other details right along the way.
Just like their malware bitten cousins, Linux hosts are often attacked because of poor privileged credential management. With so much of today’s IT infrastructure running on Linux, the need to win these security battles has never been more important.
Accomplishing cloud identity security requires a solution that can discover, audit and control access to privileged accounts entirely by machines in an automated and programmatic manner. Not through direct human intervention.
Lately there’s been an increase in organizations migrating to the cloud. However, many SMBs still seem reluctant to make the move, often due to perceived security risks. So how real are theses risks? For insight, we turned to Philip Lieberman, Identity Week’s Editor-in-Chief, as well as the President and CEO of privileged identity management vendor Lieberman Software Corporation.