Preventing the abuse of privileged rights in a cloud computing environment

February 14, 2016 Off By David

Grazed from ITProPortal.  Author: Bruce Jubb.

There was a time when the lives of those tasked with managing an enterprise’s IT security was, well, simple. Firstly, there were employees; who you knew about and (largely) trusted. You knew who they were, where they sat, what jobs they did, (and so what systems they used). And crucially, when they left.
 
And then there was everyone else. Your job was to keep everyone else outside the perimeter and only let in those who were deemed important and who you trusted.  Well, life ain’t so simple these days and I suspect those now charged with IT security would read that first paragraph and silently weep…

In a relatively short period of time, just about every aspect of corporate life had been turned upside down, from who is accessing the system, to where they’re sitting, to what systems they are using and, most crucially, what they are actually doing…

Read more from the source @ http://www.itproportal.com/2016/02/14/preventing-abuse-of-privileged-rights-in-cloud-computing-environment/#ixzz409ws0Itx