Intelligent CISO Issue 05 | Page 74

As digitisation forces organisations into the cloud, the situation is becoming complicated.

As digitisation forces organisations into the cloud, the situation is becoming complicated.

Those with large user bases are using Identity and Access Management( IAM) solutions to help simplify access while enabling security across mixed environments. Some of these solutions are based in the cloud but those looking to marry simplified access with superior security should be aware of the risks involved.
CIOs are often reluctant to put sensitive data in a cloud environment. Once it’ s there, it’ s no longer under the control of the company responsible for looking after it. It feels less secure than if it’ s kept under your own control and for good reason. Verizon confirmed that the top action involved in breaches was the use of stolen credentials in 2017, while web apps were the top target for threat actors. For now, keeping credential data off the cloud sounds like a safe bet.
It’ s important that CIOs keep sensitive data within an environment that they can control but they must still find a way to navigate the cloud. So what’ s the most simple, secure and flexible way to do so?
Considering user context
User context is a significant factor. With an increasing number of employees working remotely, they may be inadvertently making it easy for cybercriminals to steal information.
Therefore, users should only have access to enough information to do their job if it’ s safe to do so. In that changing environment, an antivirus / firewall solution alone is not enough to enable simplicity and flexibility for user access. Equally, a pure IAM solution cannot secure an organisation’ s environments on its own.
To achieve the most secure result, an IAM solution should be used in combination with an organisation’ s antivirus, firewall and other security architecture.
Meanwhile, it’ s important to bear in mind that registered users don’ t always have pure intentions. Intruders can come from within; according to Verizon, 28 % of data breaches involved internal actors, rather than external figures in disguise.
Organisations must take care to manage access effectively, so users can only see as much as they need to perform legitimate actions. While security is of paramount importance, genuine users should not be held back by overly complex authentication.
It’ s well-known that customers will abandon transactions if the journey is too difficult. According to research by American Express, 78 % of online shoppers have bailed on a transaction because of a poor service experience.
74 Issue 05 | www. intelligentciso. com