BACKGROUND IMAGE: Maksim Kabakou/Fotolia

E-Handbook:

Security access controls over identities must be priority

Manage Learn to apply best practices and optimize your operations.
This article is part of our Essential Guide: How best to secure cloud computing in this critical era

How to address cloud IAM challenges

Cloud services are major players in most companies now and can have a major impact on the management of access and identity governance. Learn how to handle cloud IAM challenges.

As organizations adopt more cloud services, security professionals face some new and interesting issues. One of the more pressing problems is the rapid proliferation of various identities associated with cloud service environments. Simply put, the more cloud services that are used, the more identities that need provisioning within these environments.

Identity and access management (IAM) in cloud environments can be problematic for tracking, monitoring and controlling accounts. Here, learn more about these problems and how to address them in an enterprise cloud environment.

Common cloud IAM challenges

In addition to standard identity management issues plaguing enterprises today, such as user password fatigue and managing a distributed workforce, there are several cloud-specific challenges enterprises face, including the following:

  • improper service and user provisioning and deprovisioning -- for example, companies not deprovisioning formeremployee SaaS accounts;
  • zombie SaaS accounts -- inactive assigned users;
  • too many admin accounts; and
  • users bypassing enterprise IAM controls.

What these issues illustrate is a lack of control over the account lifecycle that many SaaS scenarios present. But account management and lifecycle maintenance aren't the only issues when it comes to
IAM in cloud settings -- the creation of roles and management of privileges within all types of cloud environments can also be challenging.

For large organizations that may have hundreds or even thousands of defined roles across numerous accounts, just gathering an inventory of the role assignments can be a huge undertaking.

For example, one case study on the impact of cloud IAM by the security research team at Rhino Security Labs found a large number of incredibly common privilege escalation techniques in AWS in early 2018 that took advantage of poorly defined roles and privilege models. For large organizations that have hundreds or even thousands of defined roles across numerous accounts, just gathering an inventory of role assignments can be a huge undertaking. Fortunately, the research team at Rhino created a free tool that can remotely pull an inventory of all users with a breakdown of possible privilege escalation susceptibility.

Best practices for meeting IAM challenges in the cloud

To combat cloud IAM challenges, organizations need to develop a governance strategy for identities. While some may have enterprise IAM strategies in place internally, they will likely need to be adapted for cloud environments. For all actual human users, accounts should be directly linked to central directory services, such as Active Directory, which facilitate the provisioning, auditing and deprovisioning of accounts from a central store.

All SaaS applications should require the use of single sign-on linked to this central directory with federation technology. For PaaS and IaaS environments, identity governance can be somewhat trickier as all assets -- servers, serverless code, storage nodes and so on -- can have roles and privileges assigned to them. Some of these identities -- whether simple users and groups or more complex role assignments -- may not easily align with a central directory store. As such, DevOps teams may find it easier to use cloud-native tools to manage accounts and identities in some scenarios.

There are several aspects of identity governance to focus on in these cases, including the following:

  • Enterprises should develop internal standards and account creation practices that govern how DevOps and other teams integrate identities and privilege models into cloud deployments. This should include account rationale, authentication and authorization methods and controls, and lifecycle parameters.
  • Companies should use cloud-native or third-party tools to regularly pull lists of users, groups, roles and privilege assignments from cloud service environments. PowerShell for Azure and AWS Command Line Interface can collect this type of data, which will still need to be sorted, stored and analyzed by security admins.
  • Organizations must ensure logging and event monitoring mechanisms focus on all IAM activity in cloud provider environments and then monitor for any unusual activity or unauthorized changes.

Developing a governance plan for cloud IAM can be a tedious and lengthy process, but there are significant risks involved if enterprises don't. Also, don't forget to involve all relevant stakeholders as this can get political quickly.

This was last published in October 2019

Dig Deeper on Privileged access management

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

How is your company dealing with security risks like users bypassing IAM controls, former employees with active accounts or "zombies"?
Cancel

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close