Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

The Importance of Identity and Access Management (IAM) in Cloud Infrastructure

Tenable Cloud Security

How to manage human and service identities, and their entitlements, to secure your cloud infrastructure.

The widespread adoption of cloud infrastructure has turned identity into the new perimeter. Indeed, many identity and access management (IAM) solutions have evolved to offer cloud identity management of human identities and entitlements. But first-generation cloud IAM lacks the granularity, visibility and security capabilities required to manage the complex entitlements of service identities, which make up the bulk of identities in cloud infrastructure environments. Cloud infrastructure entitlement management (CIEM) bridges this gap by providing advanced identity mapping, risk assessment and anomaly detection for cloud infrastructure services. 

Read on to learn how to easily and securely manage human and service identities, and their entitlements, to secure your organization’s cloud infrastructure.

Why we need to worry about identity in cloud infrastructure

Digital transformation has accelerated in the past few years. The need for remote access due to COVID-19, combined with additional technological shifts like global connectivity and digitalization, has increased the demand for the cloud and for microservices architectures. Most organizations have built cloud adoption and migration into their business plans. Many companies founded in the last 10 years were, in fact, born in the cloud.
As a result, security has changed. Organizational networks were once perimeter-based and secured physically and by firewalls. But in the cloud, identity is the new perimeter, making identity and access permissions the security parameter with the greatest risk impact.

Cloud identities fall into two types:

  • Human identities: End-users, admins and developers; i.e. actual human beings
  • Service identities: An identity that each service assumes and that has permissions and entitlements that determine what services the identity can access and what types of activities it can perform. Every kind of resource (i.e. virtual machines, containers, data stores, secret stores, etc.) has an identity with corresponding permissions and entitlements.

Cloud identity entitlements

Each of the two types of identities can receive access rights or permissions to the organization’s cloud infrastructure. These entitlements are very powerful because they determine what an identity can and can’t do across the infrastructure, and which resources it can access.

With the right entitlements, a user or service can turn virtual machines, buckets and storage services on or off, configure the network, provide access to other identities, and even access — and potentially leak — sensitive company data.

In addition, access entitlements can be inherited: If a user or service (let’s call it A) has access to another identity (let’s call it B), A can gain access to all of B’s entitlements. This means that even if A was not explicitly granted entitlements to perform an activity, such as changing VMs, it has access to B, and if B has those entitlements, A has them, too.

As you can see, entitlements and how they work makes identities potent -- and can make an organization very vulnerable. Managing and monitoring cloud identities to prevent excessive entitlements is crucial for IAM cloud security.

The many challenges of cloud identity management

Although of crucial importance, managing identities in the cloud is no easy feat. While traditional IAM tools are useful for managing human identities, effectively managing service identities in AWS, Azure and GCP environments is a different story. The challenges include:

  • Tracking tens of thousands of identities
    Enterprises have tens of thousands of human and service identities, and thousands of policies and configuration settings, that determine access. Keeping track of such a large number of identities and permissions is painstaking and difficult.
  • High complexity
    Each identity has granular entitlements as well as convoluted connections and relationships with other identities. The result is a large number of intertwined dependencies that are very hard to audit, check and monitor. A multi-cloud environment increases the complexity multifold.
  • Lack of visibility
    Human-centric IAM tools lack the capabilities for managing service entitlements. With no suitable technology, organizations lack visibility into all identities and their entitlements, and the relationships between services and network exposure. This makes it impossible for them to manage identities - and assess their risks and vulnerabilities. Organizations are not only in the dark about identity entitlements, they also do not know the security risks of their attack surface.

Continuously monitoring access, ensuring no identity has excessive permissions and refactoring entitlements requires substantial, dedicated resources and time. Organizations typically neglect to carry out such tasks with regularity due to the massive overhead involved. This lack of governance can lead to major security risks, as in the case of the CapitalOne breach, which led to a large-scale data leak.

The solution: CIEM

By using a cloud infrastructure entitlement management (CIEM) solution to efficiently manage human and service identities, and their entitlements, organizations can ensure the security of their cloud resources and assets. CIEM enables cloud-focused identity management and risk mitigation, achieved through advanced analytics, and methods for detecting and fixing anomalies.

Six steps for getting started with CIEM

  • Quantify
    Discover and identify all identities in your cloud infrastructure. This includes human identities as well as service identities. Be sure to include third parties and users from external identity providers.
  • Gain visibility
    Get visibility into both entitlements and usage. Search for any identities that have excessive access or unused permissions, or are showcasing abnormal behavior.
  • Assess
    Understand the risks by determining which access is justified and which isn’t - and which access rights should be removed. Be on the lookout for toxic combinations. Make note of access to sensitive data, network exposure and vulnerable workloads. Create a detailed map of permissions.
  • Monitor and optimize
    Continuously review identity behavior to identify abnormalities, gain insights into which identities pose a risk and take the necessary precautions to protect your assets. Generate customized reports to help with auditing and compliance. Shift left on these processes in your CI/CD pipelines to minimize risky entitlements at source.
  • Continue investigating
    Run a continuous risk analysis to detect unusual data access, unexpected permissions modifications, privilege escalation, changes in logging and audit settings or in network configuration, unusual reconnaissance and unauthorized use or theft of access keys.
  • Ensure compliance
    Run compliance audits to audit and investigate threats according to industry standards and regulations.

The future of identity management in the cloud

The transformation to the cloud will continue to grow, with organizations increasingly building their businesses on AWS, Azure, GCP and other cloud providers. As a result, the sheer number of cloud identities — and especially service identities — will grow as well. The relationships between identities and their access to resources will become even more complex, posing enormous security problems for organizations. A CIEM platform can help manage identity entitlements and mitigate risks, improving organizational security posture and freeing up IT for other efforts. To learn about Tenable Cloud Security’s leading CIEM platform, see a product walkthrough.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training