Managing security, access in the cloud

1 March 2015 Access Control & Identity Management

Robert Doswell.
Robert Doswell.

With so much attention currently being given to the cloud, it’s time to take note of an important issue related to the topic: security. As such, although rarely mentioned, there are numerous complications and security implications that come with managing user accounts and access of cloud applications.

Without a doubt, cloud applications can provide tremendous benefits to users and organisations, but doing so should be done cautiously. For example, when several cloud applications are utilised, provisioning, password management and the monitoring of access becomes a challenge, like overlooking or losing track of who has access to what information throughout an organisation.

Because of these simple examples, several security headaches can commonly occur when using cloud applications, but there are simple solutions to solve them.

Account management

Account management in the cloud has many security issues that can become major problems. Creating accounts for cloud applications can be time consuming for both the IT department and the end user. IT has to manually create accounts in each system and application, which can delay users having access for days and not being able to get their work done. Frequently, there are only a handful of people who create accounts for the entire company, which can result in a major bottleneck. The issue is that delegating this task to other employees in the company can be a security issue since they would likely receive elevated rights within the network. As such, the organisation needs to find a way to manage accounts more efficiently without giving several people access to the company’s entire network.

Another cloud security issue is losing track of which employees have access to specific systems and applications. When an organisation begins to use several cloud applications, it becomes difficult to control that the correct people have the correct access. Users may have access to systems and applications that they shouldn’t, leaving the company’s data vulnerable.

Still another major security issue is the disabling of cloud accounts. When turnover occurs in a company that utilises several cloud applications, it is easy to forget to disable the departing employee’s access. This is because of the fact that the employee’s manager has to notify the correct person who then has to manually disable all accounts individually. Leaving an account active can result in a security risk and potential costs, since the ex-employee continues to have access the company’s applications that are paid for on a subscription basis.

There are several ways that organisations can deal with the issues that arise from using cloud applications. One way is with an automated cloud identity management solution. This allows user accounts to be automatically created, modified, enabled or disabled through synchronising with the human resource system. It allows the account manager in charge to easily make changes in one place and have it automatically synchronised to all cloud applications.

Also, to ensure that only the appropriate people have access to the cloud applications with secure information, a role-based access control (RBAC) module can be used. System administrators can then easily control access to the company’s cloud applications on the basis of department or job title in the human resource system. This ensures that each employee has the correct access, even with cloud applications.

As more cloud applications are deployed in an organisation, they need to be able to report who is using what application and system. This can be difficult with many cloud applications and lots of users. A centralised dashboard can be used in an automated identity management solution to easily see an overview of users allowing management to easily review the report for auditing purposes, as well as controlling licence costs.

Password management

In addition to managing accounts, passwords can also be a problem to manage when implementing numerous cloud applications. IT needs to manage passwords for the many users and applications that the company uses. Each system and application has a different set of complex credentials, which are often required to be changed every month or so. How can one person easily remember the five or more sets of credentials they need? The answer is that they don’t – end users often write down their credentials and keep them near their desk so that they don’t forget them. This leaves the company’s network and information on the cloud applications extremely vulnerable.

There is a simple solution, though, that many leading organisations take to handle this dilemma. A cloud single sign-on solution allows end users to use only one set of credentials for all of their cloud applications, which can be based on their existing Active Directory credentials. If for any reason a password needs to be reset, it can be changed in one place, Active Directory, and then be automatically synchronised with all cloud applications. This simple, yet effective, solution allows end users to only need to remember one set of credentials, reducing the chance they will write anything down.

Overall, the cloud is extremely beneficial to an organisation, but attention needs to be paid to the security issues and the management of accounts and passwords. Many solutions offer benefits to end users, IT departments and even management, while allowing IT to have full control over the applications and authorisations without having to spend countless hours on account management. They also ensure that everyone has the correct access to their systems.

For management, audit and compliance is made easier and there is often a reduction in expenses related to the applications and the helpdesk managing them while ensuring that the full benefits of using the cloud are achieved.

For more information go to https://www.tools4ever.co.uk/





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The power of PKI and private sector innovation
Access Control & Identity Management News & Events Government and Parastatal (Industry)
At the recent ID4Africa 2025 Summit in Addis Ababa, the spotlight was firmly on building secure, inclusive, and scalable digital identity ecosystems for the African continent.

Read more...
Biometric security key for phishing-resistant MFA
Products & Solutions Access Control & Identity Management
New FIDO-compliant USB, Bluetooth, and NFC BioKeys with biometric login and centralised management for phishing-resistant, passwordless multifactor authentication (MFA) for enterprise users.

Read more...
Gallagher Security releases OneLink
Gallagher Animal Management Products & Solutions Access Control & Identity Management
Gallagher Security has announced OneLink, a cloud-based solution that makes it faster, easier and more cost-effective to deploy security anywhere in the world, transforming how security can be delivered to remote sites and distributed infrastructure.

Read more...
Suprema unveils BioStar Air
Suprema neaMetrics News & Events Access Control & Identity Management Infrastructure
Suprema launches BioStar Air, the first cloud-based access control platform designed to natively support biometric authentication and feature true zero-on-premise architecture. BioStar Air simplifies deployment and scales effortlessly to secure SMBs, multi-branch companies, and mixed-use buildings.

Read more...
Continuous AML risk monitoring
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
AU10TIX, launched continuous risk monitoring as part of its advanced anti-money laundering (AML) solution, empowering businesses to detect behavioural anomalies and emerging threats as they arise.

Read more...
The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.