This checklist provides a guide for securing identities and entitlements in the cloud.
This checklist provides questions to consider when looking to secure identities and entitlements in the cloud. In the cloud, non-human identities routinely have entitlements to other resources, resulting in a significant expansion of identities and entitlements an organization must manage. The growing number of identities and entitlements within the cloud substantially increases risk, making them high-value targets for attackers. Organizations can leverage this document to evaluate current cloud identity security procedures to identify risks and gaps. Compare them against solution capabilities to address specific requirements.