BACKGROUND IMAGE: ktsimage/iStock

E-Handbook:

IAM technologies change the cloud security game

Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

IAM tools represent a big shift in cloud security

IT policies must explicitly establish the identity of users and their rights to access resources. Otherwise, an organization will not meet the requirements of cloud computing.

Provided a business is satisfied with its data center IT security, the best way to address cloud security is to focus on the incremental risks that public clouds create. Are there things that worked in the data center that won't work in the cloud and things the cloud adds that could create new risks? The answer to both questions is "Yes."

Cloud security strategies in recent years have centered on identity and access management (IAM) tools. This approach and these tools represent a notable shift in how IT teams control user access.

In traditional networking, users were often grouped into subnetworks whose addresses identified the organizations in which they worked. Cloud applications, combined with the expanded use of mobile devices, tend to break this static model of user identification. A user accessing an application through a web front end probably looks much like any other user, which means that identity cannot be inferred from the user's address.

A more complicated cloud security problem arises with the applications themselves. The cloud has a natural ability to support quick recovery from failure and to scale under load. This encourages developers to break applications into components to take advantage of these features. The sharing of components among applications, though, can create a kind of back door through which users might gain access to information they're not entitled to see or change.

Cloud computing reveals what should have been obvious years ago: The identity of users and their rights to access applications and resources must be explicit. If not, an organization will not meet the requirements of cloud, mobility or even the internet of things.

This is where IAM tools come into play. IAM is a successor to the single sign-on strategies that have emerged over the last several decades to simplify ID and password processes and to reduce practices like writing down passwords or using the same one for everything.

IAM tools identify who's who

All IAM tools have two pieces -- one that associates users with identities and another that associates identities with access rights. The principle is that a real person, when identified, acquires a number of attributes or capabilities that then directly or indirectly determine what they're allowed to do or see. The identities and policies are almost always stored in a repository, the security of which is tightly controlled to ensure that no one acquires rights they're not entitled to.

Identity processes can be tied to traditional ID and password protocols, linked to a dongle or permission tool, or run through biometrics. ID and password strategies are often deprecated because users don't choose rational combinations, protect them or change them regularly, but a centralized IAM process can reduce such misuse. This sort of system also makes it easy to force regular changes in passwords.

The dongle approach, using something like a USB stick, is most useful when access rights are associated with a role rather than an identity. Since a dongle can be lost or stolen, this strategy is used primarily in combination with other identity-specification mechanisms. Biometrics -- meaning fingerprints, facial recognition or retinal scan -- are the most reliable and are gaining acceptance as the best overall solution.

Assigning access rights to a role makes it easier to maintain control of those rights as people move around through different job functions.

As for the access control part of IAM, that too can be managed in a number of ways.

First, an organization can provide users with tokens that allow access to applications and information based on identity. Since the token typically needs to be tested and validated by an application, it may be necessary to make changes to the application's software.

A second approach is to hold applications in a secure zone of the network, with each application having its own security enclave. Users are admitted to an enclave based on identity. A system accomplishes this by altering firewall rules.

A third way is to add identity tokens to messages. These can be tested by firewall devices or applications at the boundary. This secures hosting zones in the cloud or the data center.

The latter two of these three approaches are preferred for the cloud because having individual cloud components test tokens can introduce performance issues.

Knowing your roles

The most modern models for IAM employ virtualization concepts to add flexibility. With these models, a real person is assigned a virtual property of identity. That property can directly translate into a set of policies or tokens that convey the right to access applications and information. Collaterally, the identity property can assign the user to one or more roles, and these roles are then the basis for conveying access rights.

The value of the role-intermediary approach is that, in most cases access, rights relate to a person's job rather than who they are. Assigning access rights to a role makes it easier to maintain control of those rights as people move around through different job functions via transfer, promotion, etc.

It's obvious that much of the progress in IAM has been focused on simplifying the mechanism for identification and control. IAM tools, however, cannot work if not properly maintained, meaning that all workers must have a reliable identity verification process and that all verified identities need to be linked correctly to access policies. Experience shows that problems with access security tend to arise because complex systems encourage practices that bypass security when they bypass complexity.

Role-intermediated IAM strategies are best for the cloud and, in particular, if they can be implemented in a PaaS cloud framework or by using cloud-provider web services that extend access control to all of the cloud elements. The IAM benefits of PaaS clouds such as Microsoft's Azure accounts for the faster integration of PaaS into hybrid enterprise IT strategies, but IAM tools from Amazon and Google now facilitate IAM control of all the major public clouds. Major software vendors, including IBM, Microsoft and Oracle, and specialty vendors, such as Courion, RSA and SailPoint, offer IAM subsystems that can be used in the cloud and the data center alike.

The cloud is only one of several IT trends complicating identity and access management, and there is no question that delaying IAM adoption will eventually hurt or even cripple a company's ability to protect its information and comply with regulatory guidelines on information security and privacy. The model for IAM is clear, and it's time for companies to step up and modernize their view of application and information security.

Next Steps

Cloud security requires sound strategies

With shadow IT, a love/hate relationship

To protect data, users and cloud vendors need to cooperate

This was last published in May 2017

Dig Deeper on Data security in the cloud

PRO+

Content

Find more PRO+ content and other member only offers, here.

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Are IAM products ready to meet your organization's cloud security needs?
Cancel
We agree, Positive Access Control is the Essential First Step to Secure Cyberspace! Ergo - a natural person - is a loose cog in the wheel that must be tightened before we can think about securing cyberspace.

The digital world is exacting and based on mathematics. Controlling who can sign in and what they can do is theoretically possible; but this pesky malleable human component in the chain of commands throws off the math. Why? Because we can’t count on a person to be exact all the time. Current software needs to allow for recovery and needs to create “backdoors” which are binary strings by nature, and can be searched, copied, distributed, altered, reused, stolen, and sold; thus, vulnerable for hacking.

Moving forward, we promote a model of continuous authentication to positively confirm the presence of a live known person and progressively observe them while facing their devices to make sure that the person not just opens the front door but - stands - in the door, blocking anybody else to get in while connected.
Cancel

-ADS BY GOOGLE

SearchServerVirtualization

SearchVMware

SearchVirtualDesktop

SearchAWS

SearchDataCenter

SearchWindowsServer

SearchCRM

Close