Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecurityManagementSecurity Enterprise ServicesSecurity Leadership and ManagementLogical SecuritySecurity & Business ResilienceSecurity Education & TrainingCybersecurity News

Securing the cloud in 2021: 3 steps to cloud-based identity

cloudnetwork
March 2, 2021

2020 was a turning point for businesses across the globe as they were forced to accelerate their digital transformation processes and accommodate an unprecedented and rapid shift to remote work. With this, they rushed long standing plans to upgrade cloud applications and services to solve a core set of immediate problems – keeping displaced workers connected without compromising data exchange. Now that we’ve learned this dependency on the cloud will continue to grow, there are new challenges that organizations have to solve in the year ahead – starting with making these cloud infrastructures more secure.

To do this, organizations must reroute the security perimeter to focus on identity. While cloud-based identity can be a complicated concept for a number of reasons, there are a few simple steps organizations can take to evolve their identity access management (IAM) strategies. By moving beyond “effective permissions,” they should instead focus on threats and risks, following a cloud IAM lifecycle approach.

 

Address the Complexities of Cloud Identity

Unlike using a firewall in a traditional data center, relying on identity in the cloud is substantially more complex because everything in the cloud has an identity – applications, services and systems – and each of these identities has to be managed. Adding an extra layer of work, each of these identities has to also be assigned a level of “effective permissions”, which involves untangling a web of confusing permission rules. For example, factors such as permissions boundaries, identity-based policies, service control policies and session policies also have to be considered when determining effective access.

Additionally, visibility drops as cloud deployments grow and security and operations teams are often lost navigating through thousands or even tens of thousands of cloud assets and principals with all different types of identity and access rules. As a result, organizations lose their ability to not only assign and manage cloud least privileged access (LPA), but also lose their ability to understand the underlying permissiveness of their cloud access. Security and operations teams can still determine whether an actor (user or application) should have access to a particular asset, but they are unable to assess the potential domino effect that access may have. Because of this, effective permissions, when used alone, no longer work in a modern IAM context.

 

Optimize Infrastructure by Reassembling Cloud IAM Policy Stacks

To execute IAM in the cloud effectively, organizations must start by reassembling cloud IAM policy stacks to align risk context, true identity, and effective permissions. The first step in this process involves laying out all of the stack’s assets, permissions, rules and accounts. This will allow teams to then match these elements to their IAM source of truth, which could be in the Active Directory, LDAP or third-party identity stores. From there, they should match applications and their respective resources, business metadata and historical context from a configuration management database (CMDB).

When taking these steps, teams can better construct an IAM boundary view to analyze and simulate all of their cloud environments. This also allows them the opportunity to quickly identify all the resources users have access to and why, giving them the background needed to accurately map out permission boundaries and identify where risk lies.

 

Take a Cloud IAM Lifecycle Approach

The dynamic nature of cloud infrastructure requires continuous permissions updates to manage risk and, as such, teams must take a lifecycle approach. Taking a lifestyle approach requires organizations to focus on four critical steps: assessing risk, prioritizing and remediating threats, establishing and managing cloud LPA, and automating for scalability.

Above all else, organizations must use available tools to assess effective permissions and identify risk. Historical data can be used to compare current efforts to previous actions, helping to address false permission alerts and highlight anomalous activities that could represent IAM policy risks or indicate areas of noncompliance.

Once the risk is calculated, it’s important to then understand the true cost of these threats to better prioritize the order in which they should be resolved. Teams should perform what-if analyses via simulation tools to model the impact of potential outcomes. Simulation can help teams understand the reach a possible exploit could have so that they can then remediate excessive and unused permissions to avoid a future incident.

Next, teams need to focus on establishing and managing cloud LPA by setting the minimum privilege possible to achieve the organization’s risk goals. Teams should take note that LPA is an ongoing process, requiring continuous assessment of privilege levels against organizational roles and permissions.

Lastly, automating remediation of common high-risk IAM alerts, such as anomalous behaviors, permission bloat, and under- or over-provisioning of LPA, is necessary to help save teams’ time as their cloud footprint expands. Doing so allows them the freedom to trust that their environments are secure despite growing activity.

As we dive deeper into 2021 and continue remote work, it’s encouraging that organizations are beginning to understand the need to secure their cloud environments. By focusing on potential threats and risks previously unexplored in cloud applications and services, implementing these three steps will help teams establish identity as the new security perimeter in the cloud and improve their ability to identify and reduce risk.

 

KEYWORDS: cloud security cyber security risk management

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Cyber tech background

    Security’s Top Cybersecurity Leaders 2026

    Security magazine’s Top Cybersecurity Leaders 2026 award...
    Top Cybersecurity Leaders
  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

Popular Stories

Pixelated brain

Critical Thinking Erosion: A Hidden Threat to Security Career Resilience

Person on iPhone

The Olympics Are Going Mobile — Your Security Strategy Has to Follow

Red and blue pawns with thought bubbles

Implementing Meaningful De-Escalation Training in Your Security Program

Fingerprint on computer board

Enhancing Incident Response with Integrated Access Control and Video Verification

Man coding

The Copilot Problem: Why Internal AI Assistants Are Becoming Accidental Data Breach Engines

SEC 2026 Benchmark Banner

Events

April 8, 2026

The Future of Executive Protection: Layering Technology, Intelligence, and Response

Digital threats to executives and other high-profile employees are evolving faster than most corporate protection programs. Learn why modern executive protection programs require data-driven, intelligence-led strategies to keep pace with the magnitude of today’s threats.

April 15, 2026

How AI is Closing the Decision Gap in Leading GSOCs

Learn how modern security teams are evolving from alert-driven workflows to outcome-driven operations and how AI is enabling faster, more confident decisions at every stage of the incident response lifecycle.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products
SEC 2026 Top Cybersecurity Leaders

Related Articles

  • cloud-computing-freepik

    4 steps to protect your data against disaster in the cloud

    See More
  • cyber_enews

    As Organizations Become Aware of Security Vulnerabilities in Cloud-Based Collaboration Applications, It’s Time to Act

    See More
  • cybersecurity-freepik1170-x658x6.jpg

    Identity-based attacks the top cyber threat in 2021

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • facility manager.jpg

    The Facility Manager's Guide to Safety and Security

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2026. All Rights Reserved BNP Media, Inc. and BNP Media II, LLC.

Design, CMS, Hosting & Web Development :: ePublishing