Shifting to Software-Defined
Showing results for 
Search instead for 
Did you mean: 

Technical Cloud Security: Identity challenges in the cloud


This is the sixth in a series of videos and blogs looking at some technical aspects of hybrid cloud security. Today we will look at some of the identity challenges in a cloud operating model. Other videos in the series can be found by searching for the tag cloudsectechvideos.

Remembering usernames and passwords is a challenge for every user, and the more applications that a user has access to, the harder it is to come up with unique but memorable passwords. Password management tools can certainly help here, but when an enterprise is looking to migrate business processes and applications into a hybrid cloud model, particularly when using SaaS applications, being able to integrate the use of an enterprise identity directory across all cloud applications becomes very beneficial.

According to recent 451 Research, being able to maintain consistent access security and authorization controls across environments was one of the major concerns of IT leaders looking to adopt hybrid cloud. Extending the enterprise identity directory across both the traditional data center as well as cloud based applications allows organizations to take advantage of identity federation – users can log onto properly federated applications using their enterprise credentials, instead of having to remember a separate set of credentials for each application.

This shared access model also makes it easier to prevent unauthorized access, and control both user and administrator access rights across the hybrid environment.

The video below goes into more detail around the role of identity in the cloud, and discusses how a shared access model can simplify cloud access concerns.



To learn more about hybrid cloud security, download the whitepaper from 451 Research Group or the Dummies Guide to Hybrid Cloud Security, HPE Edition. You can also learn more about the HPE approach to Hybrid Cloud Security on our website. Other videos in the series can be found by searching for the tag cloudsectechvideos.

0 Kudos
About the Author


Simon Leech is a Certified Information Systems Security Professional with a specialisation in Security Architecture (CISSP-ISSAP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), Certified in Cloud Security Knowledge (CCSK) and working in the Worldwide Security Center of Excellence within HPE Pointnext Advisory and Professional Services. Simon is active on Twitter as @DigitalHeMan