Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

IDSA Introduces CIEM Best Practices

Tenable Cloud Security

The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management.

While a mature identity and access management (IAM) program is not required for an identity-centric approach to security, it will definitely improve the effectiveness.

The Identity Defined Security Alliance (IDSA) regularly updates their list of IAM best practices including recommended hygiene tips that focus on the people and process, as well as the technology, aspects of an IAM program.

Their most recent addition to the list? Best practices for cloud infrastructure entitlement management (CIEM).

CIEM best practices according to the IDSA include:

  • List and track all identity relationships in your cloud infrastructure.
  • Process logs to profile the activity of identities and detect anomalous behavior patterns.
  • Integrate the remediation of excessive permissions to existing workflows.
  • Manage just-in-time (JIT) access to reduce standing privileges.

To read the full list of Best Practices, visit the IDSA website. CIEM best practices are near the end of the page.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.