Get the Maximo Application Suite E-Book Here

Emerging Cloud Security Threats

Date:

October 28, 2019

Author:

Troy Elsen, Director of Cloud Infrastructure Operations

Weak Identity and Access Management Controls

  • Identity and access management (IAM) controls are about securely managing the user account life cycle across one or many organizations. Least access principles should always be followed.
  • Administrative controls such as policies and procedures surrounding authentication and authorization should be in place to ensure industry best practice is followed.
  • Technical controls such as a third-party application that allows for centralized management and integrates with company user directories.  

Cloud provider's role in security

  • As more and more companies take their business to the cloud, there is often a blurred line regarding security roles and responsibilities.
  • Companies and cloud providers must ensure all layers of the company solution are identified and protected by one or both parties. These areas of responsibilities should be addressed during the contractual phase of the service agreement.  

IoT Security

  • The Internet of Things (IoT) continues to grow with technology. Things such as baby monitors, coffee makers, security systems and even cars are now connected to the internet.
  • Reviewing basic security requirements such as default account settings and password reset, encryption, web interface security can help prevent malicious activity.

Account Hijacking

  • Businesses will continue to increase public web transactions and increase the risk of compromise.
  • Cloud applications should have strong authentication methods and use multi-factor authentication whenever possible. Sensitive data should be encrypted in-transit and at-rest. Context-based access controls such as time of day or source location can also be used to improve account security.
Stay up to date on all the latest tips and tricks from Projetech: Click Here

Keep Reading

Data Protection in the Cloud

Data protection is vital to our core business and the continued success of customer growth. At a very basic level, it is important to point out how we protect customers’ data. There are many different approaches to protecting data in the cloud, but some of the most vital are backup, disaster recovery, business continuity,contingency planning.

Continue Reading

Maximo Automation Scripting | Introduction into Automation Scripting

Maximo is a highly configurable product. With minimal technical skills, users can add new fields, make screen changes, or restrict values of attributes in Maximo. But once you start needing to go beyond those capabilities, that’s when people start asking questions about Automation Scripts/Java Customizations. And if it’s something you haven’t done before, it can be quite intimidating at first. Hopefully this blog series will help eliminate most of the intimidation and allow you to achieve your business objectives faster.

Continue Reading

Checkout the MORE Maximo Open Forum

Check out our Webinars

Enhancing Maximo with Automation Scripts (Episode 1)

Watch the Recording

Augmented Reality (AR) – The new “must have” solution for maintenance

Watch the Recording

Top Tips for Maximo Administrators

Watch the Recording

3 Real World Starting Points to Reimagine Maximo by Simplifying IoT and AR Solution

Watch the Recording

Join the Community of 2,400+ Maximo Users

MORE provides a space for users to find resources and discuss the complexities of Maximo software with peers and experts.