IDSA Introduces CIEM Best Practices
The Identity Defined Security Alliance recently announced their list of best practices for cloud infrastructure entitlement management.
While a mature identity and access management (IAM) program is not required for an identity-centric approach to security, it will definitely improve the effectiveness.
The Identity Defined Security Alliance (IDSA) regularly updates their list of IAM best practices including recommended hygiene tips that focus on the people and process, as well as the technology, aspects of an IAM program.
Their most recent addition to the list? Best practices for cloud infrastructure entitlement management (CIEM).
CIEM best practices according to the IDSA include:
- List and track all identity relationships in your cloud infrastructure.
- Process logs to profile the activity of identities and detect anomalous behavior patterns.
- Integrate the remediation of excessive permissions to existing workflows.
- Manage just-in-time (JIT) access to reduce standing privileges.
To read the full list of Best Practices, visit the IDSA website. CIEM best practices are near the end of the page.
Learn more
- Cloud
Tenable One
Request a demo
The world’s leading AI-powered exposure management platform.
Thank You
Thank you for your interest in Tenable One.
A representative will be in touch soon.
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success