Close Menu
  • Business
    • Market Place
  • Devices & Gadgets
    • Buyers Guide
    • Trending
    • Social
  • Mobile & Telecoms
    • Broadband
  • Innovations
    • APPS
    • Start-ups
    • Software
    • AI ( artificial intelligence)
    • Auto-Tech
  • Health
    • Security
  • State
    • NCC
    • NiRA and .ng
    • NITDA
  • i-Sports
    • i-tertainment/Gaming
    • I-TV/Podcast
  • Reviews
    • Opinion
    • Special Report
    • Editorial and Analysis
  • Others
    • Events
    • Archive
    • Interviews
Facebook X (Twitter) Instagram
Latest
  • TD Africa Onboards Zinox Technologies, Expanding Its Basket of Global Brands
  • Highlights from the 10th Nigeria Innovation Summit
  • First Bank unveils its latest Digital Xperience Centre in Abuja
  • Yemisi Shyllon Museum of Art Presents Second Edition of Collecting Now Exhibition
  • E1 Lagos GP: Lagos Trends Worldwide After Hosting Africa’s Maiden Water Racing Event
  • TD Africa and IBM Spotlight Digital Innovation at GITEX Nigeria 2025
  • FBNQuest Merchant Bank bags “Great Place to Work” Certification
  • NCC in history – avoiding the psychic prison syndrome
Facebook X (Twitter) Instagram YouTube LinkedIn
IT NEWS NIGERIAIT NEWS NIGERIA
Subscribe Now
  • Business
    • Market Place
  • Devices & Gadgets
    • Buyers Guide
    • Trending
    • Social
  • Mobile & Telecoms
    • Broadband
  • Innovations
    • APPS
    • Start-ups
    • Software
    • AI ( artificial intelligence)
    • Auto-Tech
  • Health
    • Security
  • State
    • NCC
    • NiRA and .ng
    • NITDA
  • i-Sports
    • i-tertainment/Gaming
    • I-TV/Podcast
  • Reviews
    • Opinion
    • Special Report
    • Editorial and Analysis
  • Others
    • Events
    • Archive
    • Interviews
IT NEWS NIGERIAIT NEWS NIGERIA
Home»Security»How To Reduce Security Risks Posed by Cloud Identities?
Security

How To Reduce Security Risks Posed by Cloud Identities?

IT NEWS NIGERIABy IT NEWS NIGERIAMarch 3, 2023No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp VKontakte Email
account takeovers 61 percent
Share
Facebook Twitter LinkedIn Pinterest Email

By Andrei Dankevich – Product Marketing Manager Cloud Security 

Advertisement

 

The history of cloud computing goes all the way back to the1950s when the world was introduced to shared and distributed architectures with technologies like mainframe computing, for example, the IBM 701 Defense Calculator. In the subsequent years, computer scientists innovated and introduced utility computing, grid computing, and time sharing.

 

Those seeds that were sown more than seven decades ago were the definitive building blocks of the future of cloud. Today, cloud infrastructures are becoming the norm for businesses. McKinsey reports that by 2024, 80% of the average business’s IT expenses will be dedicated to cloud technology.

 

Cloud infrastructures have an array of benefits that can help a business thrive in a highly competitive landscape. However, like any technology, it has its share of complexities and challenges, some of which can cause profound and irrecoverable damage.

 

Attacks on the Cloud 

 

With the cloud computing market expected to hit revenues of over $1.5 billion by 2030 (a compound annual growth rate of 15.7% between 2022 and 2030), it’s easy to imagine cloud adoption stories as ideal and without problems. The truth, however, is that past the honeymoon phase, cloud adoption can be difficult if done without expert mediation.

 

After a cloud infrastructure adoption, IT departments for various businesses are suddenly not in complete control of their infrastructure. The security knowledge, skills, protocols, and processes they once excelled in are no longer relevant or transferable. Because of this, data breaches can occur at high frequencies and have more damaging repercussions.

 

A more ominous set of statistics reveal that the average global cost of a data breach in 2022 was a staggering $4.35 million. Some 45% of those breaches happened with cloudbased infrastructures, while 80% involved privilege abuse. And privilege abuse begins with attacks on identities.

 

Identity: The New Security Perimeter 

 

Access rights (or entitlements) are the most valuable currency in complex and distributed cloud infrastructures. Different identities in cloud infrastructures have different access rights. Some of these identities are human users, some may be machines, and either or both of those could be in-house or belong to a third-party provider.

 

Identity is the new security perimeter because malicious actors often prioritize them. An attacker can bypass most security measures with minimal challenges by hijacking an identity and gaining control over its access permissions.

 

A Case Study In What Not To Do 

 

In 2019, there was a data breach that exposed over 100 million customer records, including sensitive information like social security and bank account numbers. The breach was caused by a misconfigured firewall in company’s AWS environment, which allowed an attacker to gain access to the company’s cloud infrastructure.

 

How Can We Avoid Such Situations? 

 

The principle of least privilege (PoLP) is an age-old and fundamental concept in IT and other similar fields. In fact, you can trace it back to the pre-digital era. This is because all that PoLP essentially means is that a certain user or identity should have only the exact privileges they need to carry out their specific tasks. Any additional privileges are unnecessary and risky.

 

We hear a lot about zero-trust security models, where every user or identity needs to be thoroughly vetted and authenticated at regular intervals to maintain access permissions. PoLP is integral to zero-trust security models. It helps ensure that even if attackers were to breach a business’s system, they wouldn’t have the lateral mobility to cause severe damage.

 

Like with most things today, human workforces simply can’t keep up with the speed required to stay competitive and ahead of malicious threats. So, to implement PoLP by identifying over-permissions and right-sizing entitlements of all identities, certain robust solutions are required.

 

The identity security solutions that businesses employed in the past include Security Assertion Markup Language (SAML) providers, stronger password policies, and multi-factor authentication. However, when we think about cloud entitlements, we need a different approach. Enter Cloud Infrastructure Entitlement Management, or CIEM.

 

What Is CIEM? 

 

A CIEM (pronounced “kim”) solution helps cloud security teams navigate and manage entitlements across complex multi-cloud infrastructures. CIEM involves whittling down the permissions and privileges of cloud identities to the bare minimum. CIEM is about putting the principle of least privilege into practice and providing ultimate protection for businesses.

 

Optimizing cloud entitlements can be a cumbersome task for organizations to do themselves. To combat the increasing proficiencies of hackers, they will need to perform this optimization with great intricacy and care. Also, expertise in cloud providers’ permission systems may be required, especially for larger and more complex and distributed cloud infrastructures.

 

Key Benefits of CIEM 

 

  1. Visibility

The security potential of even perfectly configured cloud entitlements can go unrealized if a business doesn’t have visibility on them. CIEM solutions ensure that businesses have a panoramic view of all their entitlements, making it easier for them to monitor, manage, and mediate access controls in their cloud infrastructure. Visibility is critical for robust security.

 

  1. True Cross-Cloud Correlation 

When working in multi-cloud environments, businesses need to maintain consistency across components of their infrastructure. CIEM solutions help unify all identities related to users, devices, and applications throughout a company’s cloud deployment. This approach enables the implementation of consistent access control policies and a single unified audit trail across all cloud environments.

 

  1. Intelligent Correlation and Insights 

High-quality AI-driven data analytics can be a game-changer. CIEM solutions analyze and leverage user behavior data to assign permissions based on trends, patterns, and commonalities. This approach enables a business to categorize users into similar groups and assess the need for separation of duties. Additionally, data analytics supports the implementation of best practices for maintaining PoLP.

 

How Does CIEM Work? 

 

CIEM technologies analyze a cloud identity to reveal key information about how its specific entitlements were granted: directly, indirectly, through trust relationships, explicitly, implicitly, or something different. By doing so, CIEM can identify which entitlements and permissions are effective and which permissions aren’t.

 

Cloud Detection and Response (CDR) continuously gathers and examines intelligence data from cloud feeds, workloads, and configurations. CDR systems can quickly respond to cloud attacks by detecting suspicious activity and threats.

 

When companies use CDR together with CIEM, they benefit from comprehensive visibility to detect, investigate, and mitigate threats in the cloud based on monitoring the actions of  cloud identities. This surveillance is designed to reveal which permissions are being used and whether that usage is relevant, safe, and rule-abiding.

 

CIEM measures the gaps between permissions that are granted and how they are used. By doing so, they reveal permissions that simply aren’t necessary and some that are downright unsafe. CIEM helps businesses achieve a lean and muscular security protocol where each identity only has access to what it truly needs.

 

 

Another invaluable service that CIEM solutions provide is the ability to automatically generate policy recommendations that ensure that businesses comply with the principle of least privilege.

 

Conclusion 

 

CIEM solutions are necessary to reduce security risks posed by cloud identities. However, like any security measure, the quality of protection is wholly dependent on the quality of its implementation and whether or not specialized support and tools are utilized.

 

The expertise of Check Point, the leading provider of cyber security solutions, is precisely what businesses need to integrate CIEM solutions with responsibility, safety, and a keen eye on the future.

 

Post Views: 351
Share. Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Email
Previous ArticleGoogle Layoffs 12000 Including Robots
Next Article NISS engages NCC to deepens National Security
IT NEWS NIGERIA

Related Posts

3 Mins Read

Sophos XDR Excels in MITRE ATT&CK Evaluations: Enterprise

December 17, 2024
3 Mins Read

Teresa Anania Joins Sophos as Chief Customer Officer

July 23, 2024
4 Mins Read

Financial Education: 8 Important Steps To Secure Your PalmPay Account

June 25, 2024
5 Mins Read

Trend Micro blocked 18 million email threats, 4million  malicious mobile apps targeted at Nigerian businesses

May 25, 2024
Leave A Reply Cancel Reply

About Us
IT NEWS NIGERIA (www.itnewsnigeria.ng) is an on-line platform aimed at enriching Nigeria and Africa content in the cyberspace.

We believe the future is online.
Popular Updates

Design Bootcamps vs Self-Taught, A product designer’s perspective

March 22, 2024

How to get N100,000 loan @3% at Zenith Bank and other services

November 12, 2020

Interview: From Start-ups to Big Brands: Growth Marketing Strategies that work by Oluwasekemi Akinbo

May 18, 2023

Subscribe to Updates

Get the latest tech news & updates from IT NEWS NIGERIA

Facebook X (Twitter) Instagram Pinterest YouTube LinkedIn
  • About Us
  • Privacy Policy
  • Terms of Service
  • Advertise With Us
  • Contact Us
© 2025 IT NEWS NIGERIA.

Type above and press Enter to search. Press Esc to cancel.

Signup to our Newsletter