It’s a new beginning! Ermetic is now Tenable Cloud Security.

Five Approaches for Securing Identity in Cloud Infrastructure

In his recent article for the Cloud Security Alliance, Ermetic co-founder and CEO Shai Morag explained that the migration of business processes to the cloud has become mainstream and organizations are enjoying the many benefits of streamlining processes, cutting costs and creating new ways to work. There are, however, also drawbacks including the fact that […]

Shai Morag By Shai Morag
Five Approaches for Securing Identity in Cloud Infrastructure

In his recent article for the Cloud Security Alliance, Ermetic co-founder and CEO Shai Morag explained that the migration of business processes to the cloud has become mainstream and organizations are enjoying the many benefits of streamlining processes, cutting costs and creating new ways to work. There are, however, also drawbacks including the fact that tracking people and their access permissions to assets and data is extremely difficult, leaving businesses at risk.

Forrester has said that Cloud Identity Governance (CIG), is a critical factor in advancing enterprise security, allowing security and risk (S&R) professionals to “continuously discover identities, fully map them out, and control them and their access rights in multiple cloud environments.”

In the article, Shai points out the three main problem areas, according to Forrester, and explains that for most organizations, a more manageable and standardized cloud governance framework is in order. According to Shai, a best practice CIG approach should focus on five primary areas:

  • Cloud infrastructure entitlement management (CIEM)
  • Cloud Identity and Access Management (IAM)
  • Multi-factor authentication
  • Privileged Access Management (PAM)
  • Zero Trust Network Access (ZTNA)

Read the full Cloud Security Alliance article.

Skip to content