The cloud is just the same technologies from an on-premises environment running somewhere else. Any risks that you had on-premises are still there in the cloud.
If the cloud becomes the primary data center, will there even be a need for a traditional IT department? A third (33%) of nearly 140 IT pros polled thought that the cloud will be the end of the traditional IT team.
43% of respondents admitted they do not change their credentials in the cloud as frequently as they do on premises.
We asked Forrester Research for their impressions about the future of cloud security and the particular challenges of managing privileged identities in the cloud.
Each piece of the IAAS puzzle has a Privileged Identity Management element to it that has not changed from its on-premises equivalent deployment.
Can IaaS (Infrastructure as a Service) itself be used to manage some intrinsic privileges, or is a third party Privileged Identity Management (PIM) solution required? And where are there overlaps?
Making privileged access a moving target helps mitigate threats in the cloud.
While the traditional IT groups are getting gutted by the cloud, which the board and execs see as a cost panacea, security is in a position to get a windfall. The number one concern about cloud remains security.
Just like their malware bitten cousins, Linux hosts are often attacked because of poor privileged credential management. With so much of today’s IT infrastructure running on Linux, the need to win these security battles has never been more important.
A remarkable change has occurred, in which providers of cloud computing resources are becoming part of the United States Critical National Infrastructure (CNI). As cloud vendors become mission-critical to the nation, and work more closely with the US federal government, cloud providers’ security capabilities often surpass those of even the largest corporate environments.