Identity and Access Management

Logo
Presented by

Gaurav Gupta (Deputy CISO, Lord Abbett & Co) and Michael O. Bayere (Principal Officer, CSA Assurance, LLC)

About this talk

In this presentation we introduce the Identity and Access Management (IAM) domain, which includes sixteen control specifications aimed at helping both Cloud Service Providers (CSPs) and Cloud Service Customers (CSCs) follow security best practices for managing identities and access to cloud resources. Key practices, such as the principle of least privilege, segregation of duties, multi-factor authentication, and role-based and attribute-based access control, are essential for securing access to cloud functions and data. Under the Shared Security Responsibility Model (SSRM), both CSPs and CSCs share the responsibility for establishing secure access to the cloud environment. CSPs are typically responsible for offering robust identity and access capabilities, controls, and mechanisms. CSCs, in turn, define user roles, enforce strong authentication methods, and manage the full identity lifecycle, including provisioning, modifying, and revoking access, while continuously monitoring for suspicious activities. Collaboration between CSPs and CSCs in implementing IAM controls ensures that necessary protections are in place to prevent unauthorized access to CSC data and cloud resources.
Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (957)
Subscribers (73600)
CSA CloudBytes was launched as a webinar series to help us educate the industry on all matters related to the cloud. Our channel is designed to inform our audience about trending topics, new technologies, and latest research. Learn more at cloudsecurityalliance.org. Join the Cloud Security Alliance on LinkedIn and follow us on twitter: @cloudsa