InvestorsHub Logo
Followers 11
Posts 824
Boards Moderated 0
Alias Born 07/24/2003

Re: None

Thursday, 10/06/2011 4:02:49 PM

Thursday, October 06, 2011 4:02:49 PM

Post# of 249504
Before the Subcommittee on Cybersecurity, Infrastructure Protection, and Security Technologies House Committee on Homeland Security
Testimony of Tim Brown Senior Vice President and Chief Architect for Security CA Technologies
Hearing on “Cloud Computing: What Are the Security Implications?” October 6, 2011

Taxi- Interesting read if you have a few minutes to burn.

...
Identity and Access Management as a Foundation of Cloud Security
While there are certainly myriad operational issues to consider when architecting cloud solutions to deliver strong and robust security, CA Technologies believes that identity and access management (IAM) issues deserve particular attention. Our surveys of cloud providers and the views from leading industry analysts and organizations find that identity and access management is the most important issue that companies considering moving to the cloud face today. A strong trusted identity system that enables the right people to have the right access to the right information is critical to the protection and enablement of the cloud.Cloud service providers and customers generally feel comfortable that they have highly qualified IT personnel and tools which can prevent or curtail viruses from infecting their services, and that they can effectively secure data flowing in and out of cloud services. They are less comfortable with the process of identifying and authenticating the users, systems, and devices that need access to their services and managing access to specific information or data when using cloud services.One of the greatest challenges facing the IT sector today is fostering online trust, including the important trust components of security and privacy. The fact is that most online threats and successful data breaches of late have been based on and exploit access control and identity management failures in systems. The Government Accountability Office has written to Congress about unauthorized access issues as recently as Monday of this week (October 3, 2011). Identity management and access management controls are central to the secure adoption of cloud services.

http://www.ca.com/~/media/files/industrytrends/tim-brown-cyber-security-testimony.pdf
Join InvestorsHub

Join the InvestorsHub Community

Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.