Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and Copilots
    • Innovation & Leadership
    • Cybersecurity
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
  • Summit NA
  • Dynamics Communities
  • Ask Copilot
Twitter Instagram
  • Summit NA
  • Dynamics Communities
  • AI Copilot Summit NA
  • Ask Cloud Wars
Twitter LinkedIn
Cloud Wars
  • Home
  • Top 10
  • CW Minute
  • CW Podcast
  • Categories
    • AI and CopilotsWelcome to the Acceleration Economy AI Index, a weekly segment where we cover the most important recent news in AI innovation, funding, and solutions in under 10 minutes. Our goal is to get you up to speed – the same speed AI innovation is taking place nowadays – and prepare you for that upcoming customer call, board meeting, or conversation with your colleague.
    • Innovation & Leadership
    • CybersecurityThe practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
    • Data
  • Member Resources
    • Cloud Wars AI Agent
    • Digital Summits
    • Guidebooks
    • Reports
  • About Us
    • Our Story
    • Tech Analysts
    • Marketing Services
    • Login / Register
Cloud Wars
    • Login / Register
Home » The Impact of Multi-Cloud on Identity & Access Management (IAM)
Cybersecurity

The Impact of Multi-Cloud on Identity & Access Management (IAM)

Chris HughesBy Chris HughesApril 26, 2022Updated:April 30, 20224 Mins Read
Facebook Twitter LinkedIn Email
multi-cloud IAM
Share
Facebook Twitter LinkedIn Email
Acceleration Economy Cybersecurity

Last week we discussed how the modern perimeter is often now considered to be digitally Identity-based. We laid out some fundamental concepts and terms, such as Identity Provider (IdP), Single Sign On (SSO), and Multi-Factor Authentication (MFA). While all of these are challenging to do in large enterprise organizations in their own right, they become exponentially more difficult when done in multi-cloud environments.

While multi-cloud is generally discussed in the context of Infrastructure-as-a-Service (IaaS), meaning typically AWS, Azure or GCP, the reality is most organizations are already multi-cloud. Most organizations are already using multiple cloud providers’ services for compute, storage, and more. Each of these services and consumption activities is associated with its own identities, permissions, authentication, and authorization activities.

Handling Permissions and Access Controls with Multi-Cloud

Even if we stick with the general definition of multi-cloud in the context of IaaS, handling IdPs, identities, permissions, and access control in the multi-cloud paradigm is a challenging endeavor. Based on data from the 2021 Verizon Data Breach Investigation Report (DBIR), upwards of 60% of data breaches involved some type of compromised credential. This puts IAM at the center of most data breaches and of course a key focus area for malicious actors.

Each Cloud Service Provider (CSP) has its own unique platform and features when it comes to accounts, permission, and access control. Rationalizing that across the various CSPs is difficult, especially for organizations just starting to build a level of cloud security maturity. Multi-cloud essentially creates scenarios where subjects are trying to access resources across cloud providers and service offerings.

Facilitating Access Across Cloud Environments

Two of the most common ways IAM is handled in multi-cloud involves either provisioning credentials in each cloud environment or utilizing Federation, as a method to facilitate access across cloud environments and their associated resources. You’re essentially creating a trust relationship between the IdPs of the respective CSPs. This method tends to be more secure and preferred because you minimize identity sprawl, whereas with the first method you would need to have credentials created in any CSP environment you’re operating in.

The Complications of Secrets & Multi-Cloud

Another factor complicating IAM in the cloud, which inevitably is more complex in multi-cloud environments is the handling of secrets. While this can include traditional things such as Usernames and Passwords, in cloud-native environments it is increasingly involving other forms of secrets as well such as API keys and personal access tokens—both of which can be compromised by malicious actors and utilized to conduct unauthorized activities in or across cloud environments.

These secrets can be inadvertently saved, stored, or distributed by developers in cloud-native environments working with things such as source code, container images, or Infrastructure-as-Code (IaC) manifests.

Experiencing Malicious Activity

Further complicating this is when the CSPs themselves experience malicious activity which can have a cascading effect across their supply chain of consumers, partners, and integrations. A good example of this would be the recent notification from GitHub, which notified victims that an unauthorized party downloaded private repository contents by using third-party OAuth tokens.

Organizations are also increasingly turning to solutions such as Identity-as-a-Service (IDaaS) providers such as Okta, although they have had their own recent concerning activities. IDaaS offerings can often serve as CSP agnostic options to facilitate access across cloud environments. Some organizations have also begun to adopt innovative workload identity solutions such as SPIFFE and SPIRE which aim to provide a universal identity control plane for distributed systems, such as multi-cloud environments.

Final Thoughts

As is evident from the conversation above, IAM in multi-cloud environments is a complex and technical endeavor. When you look at the historical reality that credentials are involved in over half of data breaches, most data breaches in the cloud are due to customer misconfigurations and upwards of 99% of cloud identities are overly-permissioned, you don’t need to be a fortune teller to place a bet on what the future looks like, and it’s not pretty.


Want more cybersecurity insights? Visit the Cybersecurity channel:

Acceleration Economy Cybersecurity

Cybersecurity cybersecurity as an enabler featured multi-cloud
Share. Facebook Twitter LinkedIn Email
Analystuser

Chris Hughes

CEO and Co-Founder
Aquia

Areas of Expertise
  • Cloud
  • Cybersecurity
  • LinkedIn

Chris Hughes is a Cloud Wars Analyst focusing on the critical intersection of cloud technology and cybersecurity. As co-founder and CEO of Aquia, Chris draws on nearly 20 years of IT and cybersecurity experience across both public and private sectors, including service with the U.S. Air Force and leadership roles within FedRAMP. In addition to his work in the field, Chris is an adjunct professor in cybersecurity and actively contributes to industry groups like the Cloud Security Alliance. His expertise and certifications in cloud security for AWS and Azure help organizations navigate secure cloud migrations and transformations.

  Contact Chris Hughes ...

Related Posts

IBM Launches Industry-First Governance Tools for Agentic AI Security

July 11, 2025

ServiceNow Partner, Nicus: Financial Intelligence Layer for Enterprise Tech

July 11, 2025

Microsoft, Oracle, SAP, IBM Total Market Cap Is $5 Trillion: Legacy’s Revenge!

July 10, 2025

How Nicus and ServiceNow Are Transforming Enterprise IT Spend with AI and Financial Intelligence

July 10, 2025
Add A Comment

Comments are closed.

Recent Posts
  • IBM Launches Industry-First Governance Tools for Agentic AI Security
  • ServiceNow Partner, Nicus: Financial Intelligence Layer for Enterprise Tech
  • Microsoft, Oracle, SAP, IBM Total Market Cap Is $5 Trillion: Legacy’s Revenge!
  • SAP Business Network: A B2B Trading Partner Platform for Resilient Supply Chains
  • How Nicus and ServiceNow Are Transforming Enterprise IT Spend with AI and Financial Intelligence

  • Ask Cloud Wars AI Agent
  • Tech Guidebooks
  • Industry Reports
  • Newsletters

Join Today

Most Popular Guidebooks

Accelerating GenAI Impact: From POC to Production Success

November 1, 2024

ExFlow from SignUp Software: Streamlining Dynamics 365 Finance & Operations and Business Central with AP Automation

September 10, 2024

Delivering on the Promise of Multicloud | How to Realize Multicloud’s Full Potential While Addressing Challenges

July 19, 2024

Zero Trust Network Access | A CISO Guidebook

February 1, 2024

Advertisement
Cloud Wars
Twitter LinkedIn
  • Home
  • About Us
  • Privacy Policy
  • Get In Touch
  • Marketing Services
  • Do not sell my information
© 2025 Cloud Wars.

Type above and press Enter to search. Press Esc to cancel.

  • Login
Forgot Password?
Lost your password? Please enter your username or email address. You will receive a link to create a new password via email.