Emerging Cloud Security Threats

Troy Elsen, Director of Cloud Infrastructure Operations
October 28, 2019

Weak Identity and Access Management Controls

  • Identity and access management (IAM) controls are about securely managing the user account life cycle across one or many organizations. Least access principles should always be followed.
  • Administrative controls such as policies and procedures surrounding authentication and authorization should be in place to ensure industry best practice is followed.
  • Technical controls such as a third-party application that allows for centralized management and integrates with company user directories.  

Cloud provider's role in security

  • As more and more companies take their business to the cloud, there is often a blurred line regarding security roles and responsibilities.
  • Companies and cloud providers must ensure all layers of the company solution are identified and protected by one or both parties. These areas of responsibilities should be addressed during the contractual phase of the service agreement.  

IoT Security

  • The Internet of Things (IoT) continues to grow with technology. Things such as baby monitors, coffee makers, security systems and even cars are now connected to the internet.
  • Reviewing basic security requirements such as default account settings and password reset, encryption, web interface security can help prevent malicious activity.

Account Hijacking

  • Businesses will continue to increase public web transactions and increase the risk of compromise.
  • Cloud applications should have strong authentication methods and use multi-factor authentication whenever possible. Sensitive data should be encrypted in-transit and at-rest. Context-based access controls such as time of day or source location can also be used to improve account security.
Share this post
Troy Elsen, Director of Cloud Infrastructure Operations
October 28, 2019

More Blogs

Maximo 7.6 Support: Your Top Questions Answered

Maximo 7.6 Support: Your Top Questions Answered

The hottest topic the Maven and Projetech teams continue to be asked about is Maximo 7.6 Support. To help keep everyone up to date, we’ve compiled our most frequently asked questions and answers on this topic below.
Read post
Tracking Changes in Automation Scripts Using Audit Tables in Maximo

Tracking Changes in Automation Scripts Using Audit Tables in Maximo

In IBM Maximo, audit tables can be incredibly useful for tracking changes to records in the system, such as when data is created, modified, or deleted. These audit tables are typically used for tracking changes for security, compliance, or troubleshooting purposes. One application that audit tables have been a life saver is against automation scripts. By using audit tables against automation scripts, administrators can easily see recent changes and revert code when necessary.
Read post
The Value of Engaging in Maximo User Groups and Online Knowledge Sharing Communities

The Value of Engaging in Maximo User Groups and Online Knowledge Sharing Communities

Staying informed about industry trends and best practices is essential, and participating in user groups and online technology-sharing communities gives you a strategic advantage. Whether you are new to Maximo or a seasoned expert in all things EAM, these forums offer the opportunity not only to learn but to network, troubleshoot, and optimize your organization's asset management strategy moving forward.
Read post

Become a part of our thriving community with over 4,500 Maximo users.

MORE offers users a platform to discover valuable resources and engage in insightful discussions surrounding the intricacies of Maximo software. Connect with peers and experts to explore the depths of possibilities and enhance your expertise.