Welcome back to this new edition of Gov CIO Outlook !!!✖
September - 201919GOVERNMENT CIO OUTLOOKWhat are some of the recent trends and challenges in the cloud computing landscape?The most prominent challenge in cloud computing is the integration with user identity. Today, the proliferation of cloud has led to increased cloud-based applications and platforms deployed for performing various business operations. Unlike in legacy systems where users' login information are identified by validating through active directory (AD) integration, the cloud has complicated the workspace by separating identity and access information from centrally administered user account management. Trying to handle user accounts on a large number of cloud-based services without a central identity repository is extremely difficult, thereby, increasing the risk of a data breach. Consequently, organizations should try to integrate and combine identity management either through third-party solutions that would merge users account into the single or double repository through native security assertion markup language (SAML) or distributed file system (DFS). This helps in authenticating between two entities: service providers and an identity provider. What are the different methodologies available in the market for user identity integration, and how should firms adopt the best service depending on their business practices?Today, most of the firms are utilizing active directory federated services (ADFS) and DFS built-in tools that facilitate user authentication. And, others are using commercial platforms to try and enhance security associated with user identity integration such as dual factor authentication on top of the initial validation credentials: username and password. However, firms can also improve user login verification with dual factor authentication using third-party platforms.How should organizations embrace the right solutions by identifying the right partnership for identity management?Visibility is critical for organizations; numerous firms are concerned about transparency with regard to the access to their information from the cloud services. Addressing such issues, organizations should collaborate with vendors that provide access to logs and events associated with firms' data. Today, organizations are anticipating that the next significant breach is going to be within the cloud landscape. Therefore, associating with a vendor that is proficient in providing per customer access log and activity information would increase the visibility of users' activity on the cloud, thereby, empowering firms to control and respond if a threat arises. Companies are striving to aggregate their events and log information on a security information management (SIM) system. Hence, vendors that have the maturity to export events Importance of User Authentication with Cloud ServicesGeorge Khalil, CIO, City of RiversideByUniversities should devise various insurance programs and spread awareness about the importance of formal educations of risk managementCIOINSIGHTS < Page 9 | Page 11 >