Security in A Cloud: Ítauoit
Security in A Cloud: Ítauoit
Security in A Cloud: Ítauoit
Security in a Cloud
ANY ORGANIZATIONS ARE INVESTING the software and lack of programming
in identity and access management (IAM) expertise lengthened the duration of
solutions to automate security adminis- IAM projects and increased implemen-
tration functions and help reduce the tation costs.
number of resources required to perform Outsourcing IAM was another option.
manual security administration func- In the past decade, IT leaders have looked
tions. A 2008 Forrester Research study to reduce overall IT costs by outsourc-
estimates that the IAM market will grow ing many functions, but they consid-
from nearly US $2.6 billion in 2006 to ered security too risky to be outsourced.
more than US $12.3 billion in 2014. Instead, they decided that the adminis-
Organizations also are turning to IAM to tration function should remain in-house,
Auditors must meet compliance and regulatory require- but the IAM "center" should be managed
ments that are putting a greater burden by external experts.
review risi<s across on the security administration function Once organizations started to trust
in the form of additional reports, better managed service providers, IT leaders
three distinct domains records of workflow and change requests, saw they could gain additional savings
and periodic self-assessments. Moreover, by using IAM services over the Internet,
when organizations as IT budgets have declined in recent years, where multiple clients share the provider's
IT leaders have realized that automating computing resources. IAM in the cloud
outsource IT security security administration saves costs. moves identity management to a third-
IAM solutions use relatively new tech- party service provider. Client requests and
administration. nologies with their own audit challenges. user approvals travel across the Internet
Part of the solution resides in a client's through a secure tunnel to the provider.
BY SAJAY RAI AND computing environment, part of it resides The resources to be managed, such as
PHILIP CHUKWUMA in a service provider's environment, and servers, applications, and the network,
another part depends on the Internet reside in the client's computing environ-
"cloud" that links them. Auditors must ment. The users of these IT resources are
address these separate computing envi- the client's employees and business part-
ronments as part of a single strategy. ners. The service provider maintains all
the IAM servers, LDAP, and workflows
IAM TO THE RESCUE required to provision users. The client's
IAM promised a way to automate the designated users submit requests on the
security administration function. IAM Web, and the IAM workflow engine
software enabled organizations to auto- obtains all required approvals. The
mate the front-end workflow for adding provider's IAM servers respond to these
new employees (on-boarding), removing requests by submitting the appropriate
separated employees (off-boarding), and instructions for the computing resource
adding, modifying, and deleting (provi- at the client. For example, when the cli-
sioning) access requests. It also provided ent wants to create a new finance user
standard back-end adapters to automate in Active Directory and SAP, it submits
updates of common technologies like the request to the provider through the
Active Directory, Lightweight Direc- Web. The provider's IAM servers send
tory Access Protocol (LDAP), servers, instructions to the client's Active Direc-
and mainframe and mid-range sys- tory server to create a new user and add
tems. However, problems customizing the user to the finance group. They also