U.S. National Practice Leader
Information Protection and Business Resilience
Feb 04, 2014
From the Advisory Institute
Securely Operating in the Cloud
Adoption of cloud technologies is beginning to affect traditional Identity and Access Management (IAM) implementations. Typically, three key questions underpin the integration of cloud and IAM:
- How do I extend my existing enterprise IAM capabilities to manage access to cloud service providers (CSPs)?
- How should I leverage cloud-based IAM services to augment or replace legacy enterprise IAM investments?
- How do I bridge the gap as the IAM landscape evolves?
This paper compares integration approaches that most organizations are considering today, organized by the elements of KPMG's IAM framework.