|
This finding supports the narrative of organizations consuming cloud services and needing to do everything they can to mitigate the risk of security events and data breaches. That is, they need to do more to maintain their side of the role model. Top Cloud Security Threats According to CSA Insufficient identity, credential, access, and key management Identity and access concerns top the minds of cybersecurity professionals, according to the CSA report. Access is at the top of the list this year because protecting your data starts and ends with access, says Yeoh. Forrester vice president and principal analyst Andras Cser agreed. Identity and access across a CSP's platforms is everything, he says.
If you have the keys to the kingdom, not only can you just enter it, you can reconfigure it. And this is one of the biggest cloud security threats that poses serious problems to the operational stability and overall security of any organization. Attackers are no longer trying to force access to corporate infrastructure, adds Hank Schless, senior manager Australia Email List of security solutions at Lookout, a provider of mobile phishing solutions. With so many ways to compromise and steal corporate credentials, the preferred tactic is to impersonate a legitimate user to avoid detection.
So, as more organizations move their applications to the cloud, identity management continues to be a hot topic, says Tushar Tambay. He is the Vice President of Product Development for Data Protection Solutions at Entrust, a digital security and credentialing company. With many companies still working remotely, IT teams need to verify the identities of employees working from anywhere, anytime and on any device, he says. In addition, companies are engaging with customers and partners in the cloud. Special attention to key management However, Tambay adds that key management also needs to be prioritized.
|
|