Technology News

latest updates from easySERVICE™

Identity and Access Management for Cloud


As you move servers and applications into the cloud, you must still maintain security, auditing, and reporting requirements. In the cloud, the security ecosystem may no longer be entirely under your control. So, proper security provisioning, governance, and management tooling must be in place to collect the necessary security data for reporting, as well as to check for breaches and compliance.

Cloud security provisioning, governance, and management are provided by a set of identity and access management and security management services. In many organizations, these services not only deliver security services to the cloud but also to the traditional IT infrastructure. In most cases, this comes down to the linking or extension of the existing identity and access management and security management services to the cloud environment.

If you do not want to manage and maintain your own identity and access management and security management services, you can also opt to outsource them—entirely or partially—to a cloud security provider. In that scenario, it would make sense to consider “security as a service” or “identity as a service” in the cloud. Identity and access management services provide:

  • Account management
  • Role‑based access control management
  • Key and credential management (for example: through the use of a PKI)
  • Authentication services and single sign on (SSO)
  • Identity-level auditing
  • Identity federation
  • Identity provisioning

Identity provisioning takes care of identity lifecycle management and enables automatic provisioning and de‑provisioning of all user, device, and service accounts across cloud and non-cloud IT infrastructures. Of particular importance in an enterprise cloud are identity federation services—and this is certainly the case when the enterprise cloud is a hybrid cloud that reaches external cloud services such as CSP SaaS offerings.

Identity federation allows for the secure exchange of identity attributes between different cloud environments and cloud “islands” (for example: an enterprise cloud and a CSP cloud) to provide services such as SSO and transparent resource access to users of such cloud services.

One size does not fit all. The design of your governance must address the unique challenges and biases in your organization. Although change is hard, companies with effective governance processes can generate up to 40 percent higher ROI on their IT investments than their competitors, according to researchers.

At easySERVICE Data Solutions, our Cloud offerings have a common technology foundation with an open architecture for the delivery of cloud services across private, managed and public clouds, enabling seamless portability through a single management portal.

If you’d like to discuss any of the above best practices or lessons learned with us or to learn more about how we are partnering with companies just like yours to ensure the availability of mission-critical applications, please contact us at (855) US STELLAR. When it comes to governance, patience and perseverance really do pay off.


One comment on “Identity and Access Management for Cloud

  1. StellarPhoenixS
    August 21, 2014

    Reblogged this on Stellar Phoenix Solutions.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: