Save time with unbiased, independent feedback on vendor solutions.
Watch weekly bite-sized webinars hosted by IANS Faculty.
In an ideal identity lifecycle management world, applications and infrastructure would pull from a single source of identities, and organizations would then centrally manage the lifecycle within the directory. However, many cloud applications do not support
In this piece, we look at additional ways to reflect changes in the central identity directory for cloud applications and infrastructure, the protocols required, and the associated benefits and challenges of each.
When dealing with only a few applications, administrators or application owners can create or delete user accounts manually. With a few employees or with low employee turnover, manual efforts don’t take too long and don’t expose the organization
to too much risk. When the number of employees and applications multiply, however, the time and risk multiply as well. This could result in:
There are four broad strategies for managing user accounts in web applications hosted in cloud IaaS:
All the above strategies apply to the cloud IaaS infrastructure itself as well.
In order to try and get the best lifecycle management with the least amount of overhead, organizations should consider:
Although reasonable efforts will be made to ensure the completeness and accuracy of the information contained in our blog posts, no liability can be accepted by IANS or our Faculty members for the results of any actions taken by individuals or firms in connection with such information, opinions, or advice.
February 21, 2024
By IANS Research
Learn why cloud IR is critical to security and not just another box to check. Find guidance to get started building a strong cloud IR program.
February 15, 2024
By Alex Sharpe, IANS Faculty
IANS Faculty member Alex Sharpe discusses the risks around AI adoption and provides governance guidance to make your AI launch safe and mitigate risk.
February 13, 2024
By IANS Faculty
Learn how to how to use NIST to modify secure baseline configurations to account for risk and improve security posture.