Welcome!

Virtualization and Cloud

Jonathan Gershater

Subscribe to Jonathan Gershater: eMailAlertsEmail Alerts
Get Jonathan Gershater via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Blog Post

Identity Management Requirements for the Public Cloud

Look before you leap

The Security for Cloud Computing: 10 Steps to Ensure Success white paper provides a practical reference to help enterprise information technology (IT) and business decision makers as they analyze and consider the security implications of cloud computing on their business. The paper includes a list of steps, along with guidance and strategies, designed to help these decision makers evaluate and compare security offerings in key areas from different cloud providers. The paper discusses the threats, technology risks, and safeguards for cloud computing environments, and provides the insight needed to make informed IT decisions on their treatment.

I would like to thank the lead authors of this paper for allowing me to head up the Identity Management section (step #3) of this important paper.

Step 3: Manage people, roles and identities
Consumers must ensure that their cloud provider has processes and functionality that governs who has access to the consumer's data and applications. This ensures access to their cloud environments i is controlled and managed.

Free download below

More Stories By Jonathan Gershater

Jonathan Gershater has lived and worked in Silicon Valley since 1996, primarily doing system and sales engineering specializing in: Web Applications, Identity and Security. At Red Hat, he provides Technical Marketing for Virtualization and Cloud. Prior to joining Red Hat, Jonathan worked at 3Com, Entrust (by acquisition) two startups, Sun Microsystems and Trend Micro.

(The views expressed in this blog are entirely mine and do not represent my employer - Jonathan).