Achieving least privilege at cloud scale with cloud infrastructure entitlements management
Maya Neelakandhan,
Guruprasad Ramprakash and
Mrudula Gaidhani
Additional contact information
Maya Neelakandhan: CloudKnox Security, USA
Guruprasad Ramprakash: CloudKnox Security, USA
Mrudula Gaidhani: CloudKnox Security, USA
Cyber Security: A Peer-Reviewed Journal, 2022, vol. 5, issue 3, 227-236
Abstract:
Managing identities and permissions for enterprises at cloud scale is a major problem today. Cloud infrastructure entitlement management (CIEM) focuses on cloud access risk by providing enterprises with a robust platform for governance and entitlement controls and managing risk. Scaling out an enterprise’s infrastructure using public cloud comes with its own set of risks, including knowing all the identities that have access to your infrastructure and the permissions that they have once access is permitted. Ignoring the proliferation of identities and their associated permissions increases the potential attack surface for hackers who get access to cloud infrastructure. Implementing the principle of least privilege with CIEM helps enterprises manage their growing cloud infrastructure while keeping security in mind. This paper provides an overview of the problems that enterprises face with managing identities and permissions and how CIEM solutions can be effective for these issues.
Keywords: multi-cloud; CIEM; entitlements management; zero trust; least privilege (search for similar items in EconPapers)
JEL-codes: M15 (search for similar items in EconPapers)
Date: 2022
References: Add references at CitEc
Citations:
Downloads: (external link)
https://hstalks.com/article/6867/download/ (application/pdf)
https://hstalks.com/article/6867/ (text/html)
Requires a paid subscription for full access.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:aza:csj000:y:2022:v:5:i:3:p:227-236
Access Statistics for this article
More articles in Cyber Security: A Peer-Reviewed Journal from Henry Stewart Publications
Bibliographic data for series maintained by Henry Stewart Talks ().