Identity and access management (IAM) tools are changing the face of cloud security. Once upon a time, users were mostly collected into subnetworks whose addresses identified the organizations in which they worked. In the cloud, though, users accessing an app through a web front end look pretty much like any other users - their identity can't be deduced. Moreover, because the cloud is great at supporting quick recovery from failures and being able to scale under load, developers are often tempted to break applications into components to access particular features. However, this can create a back door through which users might gain access to information they're not entitled to. How do we make user identities and rights explicit? This e-Guide offers an introduction to some of the issues around IAM tools and their use in the cloud.
Learn More
0 comments:
Post a Comment