The shifting landscape of Identity and Access Management landscape in Cloud
Cloud Security Podcast
Award Winning Globally Ranked 100 Weekly LIVE Video & Audio Podcast talking about Cloud Security
Discover how Identity is Reshaping Access in the Complex Cloud Environment
Incase, this is your 1st Cloud Security Newsletter! Welcome, we are a Weekly newsletter from the team behind Cloud Security Podcast & AI CyberSecurity Podcast deep diving into top of mind topics in emerging technology to make sure collectively we feel confident securing things in this every changing world of Cloud, AI and whatever comes next.
Who else is here reading with you? Ashish & Shilpi , from the weekly show Cloud Security Podcast , friends and colleagues from companies like Netflix, Citi, JP Morgan, Linkedin, Reddit, Github, Gitlab, CapitalOne, Robinhood, HSBC, British Airways, Airbnb, Block, Booking Inc & more who subscribe to this newsletter. If you are reading this - thank you for supporting us and sharing with your friends who like to learn a new Cloud Security Topic from their industry peers every week.
Identity and Access Management in the Cloud
This week we ran a BlackHat Recap LIVE on our audio and video channels and if you missed it, you can still catch it here. It will also be dropping (in an edited version) on YouTube and your podcast platforms next week and you can expect a deep dive on next week’s edition of this newsletter.
One of the themes that we saw this year, gaining some maturity and some revisited attention and rightly so was IDENTITY & ACCESS. For the other themes you will just have to wait for next week’s edition of the newsletter (we promise it would be worth the wait ??)
To take us on a journey of IAM in the Cloud, today we will revisit our conversations with Brigid Johnson , Director of AWS Identity, Ian McKay, Cloud Principal, Jeff Moncrief , Field CTO of Sonrai Security
?? Definitions and Core Concepts
Identity and Access Management (IAM) is a crucial aspect of cloud security, especially in complex environments like today’s cloud ecosystem. Let's break down some key concepts:
"When you move into the cloud, it's very different. Identity suddenly doesn't mean only your user identities, but also means the components that make up your computer as well. So your servers and your things that are really serve like serverless Lambdas things like that. And so suddenly those servers take on their own identity and they have privilege to do things or not do things."
?Ian McKay
What is Identity in Cloud, then?
This expanded concept of identity requires us to expand our approach to access management for “what is an identity in cloud?”:
Human Identities
Non Human Identities
Service Identities
Application Identities
Workload Identities
Device Identities
Robotic Process Automation (RPA) Identities
Temporary or Dynamic Identities
??? The Principle of Least Privilege: A Cornerstone of Modern IAM
Least privilege is not just a best practice; it's a fundamental principle that should guide your entire IAM strategy.
Implementing least privilege involves:
?? Identity Federation and Single Sign-On: Simplifying Complexity
As organizations grow and adopt multiple cloud services, managing identities across these environments becomes increasingly complex. Identity federation and Single Sign-On (SSO) offer a solution to this challenge.
Key benefits include:
领英推荐
However, it's crucial to remember that federation is not a silver bullet.
"You've heard identity is the new perimeter, right? I don't agree with that. Identity is the new network. We must start saying that it is not about federated identity and multi factor authentication. That is just such a small piece of the puzzle."
?Jeff Moncrief
?
This Newsletter Issue’s Sponsor
Dive deep into AWS Cloud Security at ACCESS: The Cloud Identity, Access, and Permissions Summit ? — completely free!
Taking place on September 19th, ACCESS is designed with sessions built for Cloud Security Pros looking to master AWS cloud identities. Connect with industry leaders and peers to explore the latest trends and best practices.
Highlights include:
Secure your spot now and elevate your cloud security skills!
?
Actionable Insights for CyberSecurity Professionals tackle Identity in Cloud ??
?? Visibility and Governance: The Foundation of Effective IAM
In complex cloud environments, maintaining visibility into your identity (both Human and non-human??) landscape is crucial. This involves:
?? Advanced IAM Strategies for Cloud-Native Environments
As organizations embrace cloud-native architectures, traditional IAM approaches may fall short. Consider these advanced strategies:
?? Rethinking IAM in the Era of Multi-Cloud and Hybrid Environments
As organizations increasingly adopt multi-cloud and hybrid strategies, IAM becomes even more complex. Key considerations include:
?? Related Podcast Episodes
AWS IAM Getting Started with Ian McKay, Cloud Principal,
Streamlining AWS Cloud Access Controls for Human and Non Human Identities - AWS IAM Access Analyzer with Brigid Johnson , Director of AWS Identity
Why Least Privilege Matters in Cloud Security? with Jeff Moncrief , Field CTO of Sonrai Security
?? Are you interested in AI Cybersecurity?
Then you should definitely checkout our sister podcast AI Cybersecurity Podcast that is hosted by Ashish Rajan and Caleb Sima .
?
??????Cloud Security Training from Practitioners!
Want to learn more about Cloud Security or know someone who wants to, we got you !
If you have been following our journey for a while, you would know that one of the big reasons we started Cloud Security Podcast was to make cloud security knowledge accessible for anyone wanting to learn it.
Have you joined our FREE Monthly Cloud Security Bootcamp yet. There are paid online and corporate trainings available for those looking to hit their Cloud Security goals this year!
?
We would love to hear from you?? for a feature or topic request or if you would like to sponsor an edition of Cloud Security Newsletter.
Thank you for continuing to subscribe and Welcome to the new members in tis newsletter community??
Hope you are enjoying this new look Cloud Security Newsletter, there’s plenty more to come.
Peace!
Was this forwarded to you? You can Sign up here , if this was helpful for you.
Want to sponsor the next newsletter edition! Lets make it happen
IAM is vital in cloud environments. Advanced approaches like ABAC and JIT Access are indeed crucial for securing multi-cloud and hybrid strategies. These strategies align with the dynamic nature of cloud-native architectures.
This week's newsletter sponsor is Sonrai Security. Dive deep into AWS Cloud Security at?ACCESS: The Cloud Identity, Access, and Permissions Summit?— completely free! - https://sonraisecurity.com/access-summit/