Identity management or identity access management is the IT security practice that allows administrators to provision the right services and access to the right users at the right times.
But in the age of shadow IT and users bringing their own cloud and devices, employees can become the weakest link in your security and compliance practices – and you wouldn’t know until it’s too late.
“When you’re considering a cloud solution, identity management is something you have to have” said Chris Steffen, Chief Evangelist of Cloud Security for Hewlett Packard Enterprise, speaking to us as part of our Cloud Security Guru series. “You have to figure out a way to make it as seamless as possible for your users and services to access that environment without causing a ton of administrative headache.”
So what are the fundamentals of IAM in relation to cloud security and where do you start when separating privileges, especially if you have hundreds or thousands of employees?
Read Chris’ recent blog post on identity management
Learn more about HPE Cloud Security and download their Critical Security and Compliance Considerations for Hybrid Cloud Deployments report by 451 Research.