Welcome!

@CloudExpo Authors: Terry Ray, Liz McMillan, Yeshim Deniz, Pat Romanski, Zakia Bouachraoui

Related Topics: @CloudExpo, Microservices Expo, Agile Computing, Cloud Security, @DXWorldExpo, SDN Journal

@CloudExpo: Article

Privileged Identity Management in the Cloud

Key security concerns for cloud service providers

Every cloud infrastructure can be home to potentially hundreds of thousands of vulnerable privileged accounts. The presence of automated hacking tools means improperly secured privileged logins are almost certain to give hackers free reign on the network and access to customers' private data, within minutes of an incursion.

Until now privileged accounts and other file-based secrets have proven difficult to secure within large-scale, dynamic Cloud Service Provider (CSP) networks, and many still use humans and first-generation software tools to manage the task.

As a result, improperly secured privileged accounts provide an easily exploited attack surface for hackers and malicious insiders.

Key Security Concerns for Cloud Service Providers
The problem with improperly secured privileged accounts is a particular concern for cloud providers.

CSPs face significant problems from any data loss incidents - including direct remediation and legal costs, along with the loss of business resulting from public disclosure of data breaches. These service providers also face a daunting challenge to secure constantly changing physical and virtual IT assets using security methodologies that, in some cases, were never intended to scale to the size of today's cloud services networks.

In general, privileged identities aren't managed by conventional Identity and Access Management (IAM) systems because, unlike conventional user logins, privileged accounts aren't typically provisioned. Instead, privileged accounts frequently appear on the network whenever physical and virtual IT assets are deployed and changed.

As a result, privileged credentials must be discovered and continuously tracked by software that's separate from IAM. And, because every shared, static, or cryptographically weak privileged identity represents a potential attack surface, IT regulatory mandates - including PCI-DSS, SOX, HIPAA and others - require that these credentials be frequently changed and cryptographically complex. Access to these privileged accounts must also be attributed to named individuals and audited.

However, this can seem an overwhelming challenge when access lists, and even the assets themselves, change more rapidly than human intervention can manage.

How to Manage the Privileged Account Problem
Cloud Service Providers are faced with significant security challenges when managing privileged identities, certificates and other file-based secrets on a massive scale in large and elastic environments. In the world's largest multi-tenant organizations, the number of systems that need to be managed can extend into the hundreds of thousands. A truly secure environment requires all identities on all systems to be discovered and managed.

In order to accomplish this, cloud providers and other large enterprise deployments need a solution that can discover, audit and control access to privileged accounts entirely by machines in an automated and programmatic manner - rather than through direct human intervention. Only by deploying automated security solutions can these organizations locate and remediate weaknesses faster than nation-state attackers and other professional criminal hackers can exploit them.

With automated and programmatic controls over privileged identities, cloud service providers can achieve:

  • Privileged account discovery and tracking that is both broad in platform scope and deep in account discovery (including process and service interdependencies to enable safe, automated changes of any interdependent accounts without disruptions)
  • Password changes, as needed to comply with regulatory mandates
  • Rules for human and machine access to privileged accounts
  • Ongoing detection and decommissioning of inactive privileged accounts as they are removed

Conclusion
Now that next-generation security solutions exist that meet Cloud Service Provider requirements for managing privileged identities, certificates and other file-based secrets in large, elastic environments, a significant operational roadblock is removed that once prevented the largest CSPs from complying with industry and regulatory requirements.

More Stories By Jess Richter

As Vice President of Strategic Alliances at privileged identity management vendor Lieberman Software Corporation, Jess Richter is responsible for developing strategic partnerships with large enterprise cloud providers, system integrators and OEMs. For more information on Lieberman Software visit www.liebsoft.com

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
The technologies behind big data and cloud computing are converging quickly, offering businesses new capabilities for fast, easy, wide-ranging access to data. However, to capitalize on the cost-efficiencies and time-to-value opportunities of analytics in the cloud, big data and cloud technologies must be integrated and managed properly. Pythian's Director of Big Data and Data Science, Danil Zburivsky will explore: The main technology components and best practices being deployed to take advantage of data and analytics in the cloud, Architecture, integration, governance and security scenarios and Key challenges and success factors of moving data and analytics to the cloud
For years the world's most security-focused and distributed organizations - banks, military/defense agencies, global enterprises - have sought to adopt cloud technologies that can reduce costs, future-proof against data growth, and improve user productivity. The challenges of cloud transformation for these kinds of secure organizations have centered around data security, migration from legacy systems, and performance. In our presentation, we will discuss the notion that cloud computing, properly managed, is poised to bring about a digital transformation to enterprise IT. We will discuss the trend, the technology and the timeline for adoption.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical to maintaining positive ROI. Raxak Protect is an automated security compliance SaaS platform and managed service, that enables cloud apps to be deployed securely, quickly, cost-effectively, and without human error.
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.