Cybersecurity

Delinea Whitepaper: Critical Controls For Modern Cloud Security

Check out Ingram Micro's latest Cybersecurity materials for Asia Pacific.

Issue link: https://corp.ingrammicro.com/apac/advancedsolutions/i/1453362

Contents of this Issue

Navigation

Page 1 of 8

WHITEPAPER Critical Controls for Modern Cloud Security 2 Executive summary The cloud makes new levels of speed and scale possible while freeing people from the time and expense of on-premise infrastructure so they can focus on critical projects. With virtual resources supporting you behind the scenes, you can stop installing and patching servers, maintaining uptime, and responding to problems at 3 AM. Instead, moving to the cloud demands that IT operations and security teams update their skills and practices to support a new, more efficient way of working. In a cloud model, managing privileged access to workloads, services, and applications remains your responsibility, not the cloud providers'. It's also your responsibility to make sure data going to and from the cloud (via web browsers, Email, file exchanges such as STP, APIs, SaaS products, and streaming protocols) is adequately secured. Unfortunately, many organizations aren't adequately implementing and enforcing these policies around this privileged access. This paper will show you how Privileged Access Management (PAM) is a critical control for modern cloud security. We'll break down the most common cloud use cases across Infrastructure-as-a-Service (IaaS), Platform- as-a-Service (PaaS), Software-as-a-Service (SaaS), and DevOps that are vulnerable to privileged account a acks. You'll learn how to use PAM to mitigate some of the biggest vulnerabilities across the cloud a ack surface so you can realize the promise of the cloud and secure your most sensitive assets. 1. IDC Survey Report: State of Cloud Security 2021 (h ps://l.ermetic.com/wp-idc-survey-results-2021) 2. h ps://www.gartner.com/smarterwithgartner/is-the-cloud-secure/ The challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. In nearly all cases, it is the user — not the cloud provider — who fails to manage the controls." → Gartner Research 2 98% of companies experienced at least one cloud data breach in the past 18 months — up from 79% in the previous period. 60% of large enterprises cited access vulnerabilities as the primary root cause of their cloud data breaches. 1

Articles in this issue

Links on this page

view archives of Cybersecurity - Delinea Whitepaper: Critical Controls For Modern Cloud Security