Crafting an Identity-based Security Strategy for Cloud

By Richard Dornhart, National Security Practice Manager, Data#3 Limited

As most of IT professionals would agree, cyber security is a massive issue in today’s digital world. And yet, organisations of all sizes are struggling to address an increasingly complex threat landscape.

IT SecurityIn the context of enterprise Cloud security, Identity and Access Management (IAM) tools play a greater and more critical role. For instance, in a recent TechTarget article the author suggests that whilst it’s not difficult to build new security approaches into new Cloud-based applications, the harder aspect of IAM is to extend this security model into traditional IT.

Furthermore, the selection and implementation of an IAM procedure for Cloud security requires a different security approach, with identifying common patterns and technologies being a key first step.

The key takeaway, is that IT leaders need to consider their industry and its particular compliance regulations for Cloud – before the implementation of identity governance to avoid potential pitfalls or challenges in the retrofitting of policies.

Read the full TechTarget article.

Contact Richard on LinkedIn

Tags: Security



K-12 Video Period
Securing the school network amidst escalating threats

Security threats are now a routine problem for increasingly connected education institutions. The good news is that a new generation…

Protecting Data in a Cloud World: What You Need to Know About Azure Backup

Welcome to Part 1 of our 3-part blog series, exploring data protection options and considerations for when you’re operating in…

The Southport School Revisited
The Southport School: Four Years On

How have their investments in wireless networking and security paid off after four years? Download Customer…

Palo Alto Security Growth Partner of the Year
Data#3 Triumphs with Palo Alto Networks Security Award

November 11, 2022; Sydney, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Delivering the Digital Future, Securely

Cyber security challenges continue to evolve, compliance obligations increase and skills shortages stress your teams – what if we could…

ACSC Essential Eight Maturity Model: Regular Backups
Essential Eight Maturity Model: Regular Backups

In 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to Mitigate Cyber Security Incidents Maturity…

Data#3 Named Global Cisco Security Partner of the Year
Data#3 Accomplishes Five Year Winning Streak – Named 2022 Global Security Leader

November 02, 2022; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, is proud to announce that it has…

Blog - Network Visibility and Authentication
Network visibility and authentication: Your school’s cyber security superpowers

When it comes to cyber security, schools need to be as vigilant as any business. After all, they deal with…