Advisory Note: Authorization in the Cloud - 70217

Report Details

Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that access to that data is mainly over the internet.  The need to identify users, to control what they can access, and to audit their activities is even more important when services are being shared over the internet with other organizations. Furthermore the legal and regulatory responsibility for this management remains with the organization owning the data rather than the Cloud provider. It is therefore essential that organizations adopting a Cloud computing approach ensure that the responsibilities, processes, models and technologies for authorization are taken into account when choosing a Cloud Platform or Cloud Provider.

You can get access to this document for free, if you register for KuppingerCole Select access now.

Date Title Price
Jun 14, 2011

Advisory Note: Authorization in the Cloud - 70217

Authorization covers the processes and technologies concerned with managing, enforcing and auditing the rights of access that individuals have to resources. The essential characteristic of Cloud Computing is that data and resources are held remotely from the users of that data and that…

€295.00
excl. VAT
Get Access
Mastercard Visa PayPal INVOICE

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

Future-Proofing Your Cybersecurity Strategy

It’s May 25 today, and the world hasn’t ended. Looking back at the last several weeks before the GDPR deadline, I have an oddly familiar feeling. It seems that many companies have treated it as another “Year 2000 disaster” - a largely imaginary but highly publicized issue [...]

Latest Insights

Hot Topics

Spotlight

Compliance, Risk & Security Learn more

Compliance, Risk & Security

Whether public, private or hybrid clouds, whether SaaS, IaaS or PaaS: All these cloud computing approaches are differing in particular with respect to the question, whether the processing sites/parties can be determined or not, and whether the user has influence on the geographical, qualitative and infrastructural conditions of the services provided. Therefore, it is difficult to meet all compliance requirements, particularly within the fields of data protection and data security. The decisive factors are transparency, controllability and influenceability of the service provider and his [...]

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00