<p>Cloud infrastructure entitlement management (CIEM) is a modern cloud security discipline for managing identities and privileges in cloud environments. As organizations shifted from on-premises computing and storage systems to cloud-based infrastructure accessed via the internet, IT and security teams established a set of practices and processes to determine which users can access <a href=”https://www.techtarget.com/searchcloudcomputing/definition/cloud-infrastructure”>cloud infrastructure</a> and for what specific purposes.</p>
<div class=”ad-wrapper ad-embedded”>
<div id=”halfpage” class=”ad ad-hp”>
<script>GPT.display(‘halfpage’)</script>
</div>
<div id=”mu-1″ class=”ad ad-mu”>
<script>GPT.display(‘mu-1’)</script>
</div>
</div>
<p>At its core, CIEM helps organizations do the following:</p>
<ul class=”default-list”>
<li><b>Govern identity access.</b> CIEM lets organizations enable and track which users have permission to access what in the organization’s cloud infrastructure, regardless of whether that cloud environment is with a single cloud provider or multi-cloud.</li>
<li><b>Enforce least-privileges access.</b> The objective of entitlement management is to understand and catalog the access entitlements that exist within the cloud environment. This lets an organization provide users with seamless and secure access to the cloud infrastructure they require to perform tasks. It simultaneously prevents users from accessing infrastructure that they aren’t authorized to use. This is known as the principle of least privilege, or <a href=”https://www.techtarget.com/searchsecurity/definition/principle-of-least-privilege-POLP”>POLP</a>.</li>
<li><b>Integrate with other access management tools.</b> CIEM is one component of an organization’s identity access management (<a href=”https://www.techtarget.com/searchsecurity/definition/identity-access-management-IAM-system”>IAM</a>) program, and it works in conjunction with cloud security posture management (<a href=”https://www.techtarget.com/searchsecurity/definition/Cloud-Security-Posture-Management-CSPM”>CSPM</a>) tools. CIEM also dovetails with the <a href=”https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network”>zero-trust security model</a>, &l
[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.
Read the original article: