Enterprises experiencing digital transformation increasingly adopt cloud governance tools to meet business demands for elasticity, flexibility, and scalability. With hybrid IT becoming the norm, critical enterprise assets are now fragmented. Sensitive data or critical infrastructure already live in the cloud and outside the enterprise’s traditional perimeter. Given the new ecosystem, today’s enterprise needs to implement cloud governance best practices designed to ensure information security within the cloud governance model.
The responsibility for appropriate and consistent enforcement of compliance and security controls and policies is the responsibility of the enterprise. Because each cloud governance tool offers different degrees of control over security, identity has become the primary factor that brings together security and trust.
Identity Governance and Administration (IGA) tools don’t always meet the need to secure some types of identities such as users, devices, business partners, customers, etc. In addition, most IGA tools only understand coarse-grained access and cannot be easily extended to secure data, infrastructure, and fine-grained application entitlements.