Centrify Joins Several Working Groups within Cloud Security Alliance, Recognizing Key Role of Privilege Management in Cloud Security

3

Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, today announced that several of its executive leaders have joined key working groups within the Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment.

CSA working groups are the go-to source for best practices, research and tools for providing security assurance and privacy in the cloud. Centrify is proud to have joined the following CSA working groups:

  • The Hybrid Cloud Security Services Working Group. This working group proposes to provide suggestions on hybrid cloud governance, hybrid cloud threat profiles, and hybrid cloud security evaluation, guiding both users and cloud service providers to choose and provide secure hybrid cloud solutions, and promoting security planning and implementation.
  • The Software Defined Perimeter Working Group. This research working group was established in 2013 with the goal to develop a solution to stop network attacks against application infrastructure. It is the main CSA working group tackling Zero Trust practices.
  • The DevSecOps Working Group. This working group focuses on creating a transparent and holistic management approach that leverages the synergies between the development, security and operational functions, making way towards a proactive and agile security stance.
  • The Containers and Microservices Working Group. This working group conducts research on the security of application containers and microservices and publishes guidance and best practices for the secure use of application containers and microservices.

Centrify brings its deep expertise in Privileged Access Management (PAM) to these CSA working groups. The modern threatscape in the cloud is much different than when privileged access was confined to on-premises systems and resources that were under your direct control. While common security models should be applied to the cloud as they are on-premises, workloads running in the cloud require new solutions for least access and least privilege that are more dynamic and less reliant on managing shared accounts and static passwords.

IT decision makers are prioritizing PAM as a critical security effort when faced with a rapidly-evolving and expanding threatscape, including hybrid and multi-cloud environments. Research firm Gartner has listed PAM as a Top 10 cybersecurity project two years in a row[1]. Today, privileged access abuse is involved in almost three out of every four breaches, yet less than half of organizations are controlling privileged access to cloud workloads. That’s why it is more important than ever for organizations like CSA to continue to drive thought leadership across the security industry and identify best practices. Centrify will make contributions to CSA working groups to help define and communicate best practices for securing privileged access to cloud workloads.

“Centrify’s participation in CSA underscores the company’s deep commitment to advancing cloud security, specifically creating awareness about the increasing need to protect cloud infrastructure and workloads with Zero Trust Privilege,” said Nate Yocom, CTO of Centrify. “Centrify is excited join these critical working groups within CSA to give back to the industry, bring decades of experience with identity and access controls, and help organizations address modern, diverse IT environments and evolving attack surfaces.”

 

3 Comments
  1. Austin Powell says

    There is visibly a lot to know about this. I suppose you made some good points in features also.

  2. tinyurl.com says

    Its like you learn my thoughts! You seem to grasp a lot approximately this, such as you wrote the guide in it or something.

    I feel that you just can do with some p.c. to power the message house a little bit, but other than that, this is great blog.
    An excellent read. I’ll definitely be back.

  3. http://tinyurl.com/ says

    This post will assist the internet users for setting up
    new weblog or even a blog from start to end.

Leave A Reply

Your email address will not be published.

Do NOT follow this link or you will be banned from the site!