Quantcast
Channel: CodeSection,代码区,网络安全 - CodeSec
Viewing all articles
Browse latest Browse all 12749

Want a More Secure, More Effective Cloud? Watch Your Machine Identities.

$
0
0

Want a More Secure, More Effective Cloud? Watch Your Machine Identities.

kdobieski

Fri, 12/14/2018 15:45

Long before the invention and adoption of the cloud, the importance of protecting user identities, the identities of people, was obvious. File systems and operating systems going as far back as the 1970s, if not earlier, have had user access built-in. People are assigned usernames and passwords, and files and folders are configured to be accessible only to certain users or user groups.

There are many different methods of authentication, but passwords are one of the oldest and most frequently implemented. If I want to install a new package on my linux desktop, I’d better know my root password! An attempt by a cyber attacker to privilege escalate within my operating system may entail trying to crack my root password. This is why organizations spend lots of money and resources to make sure that only authorized users have access to their authentication credentials. These user identities can apply to individual devices, local networks, wide area networks, online services, and cloud networks of all kinds.

Users have identities, but so do machines, including those in the cloud. A classic type of machine identity is a TLS certificate for an HTTPS website, or any other sort of TLS/SSL encrypted internet service. Code-signing certificates are machine identities that help to verify that software is authentic and legitimate. Also, machine identities, such as SSH keys can help assure that only authorized clients can securely gain remote access to sensitive computer systems via the SSH protocol.But what I’d most like to talk about today is howTLS certificates can be used asmachine identities for microservices and containers within cloud networks.

Related Articles

IoT and Machine Identity Protection: Getting Smarter about Securing Smart Technologies Why the Rise of Enterprise IoT Puts Machine Identities to the Test Securing the Supply Chain: Machine Identity Protection in IoT Applications
Want a More Secure, More Effective Cloud? Watch Your Machine Identities.

Guest Blogger: Kim Crawley

Long before the invention and adoption of the cloud, the importance of protecting user identities, the identities of people, was obvious. File systems and operating systems going as far back as the 1970s, if not earlier, have had user access built-in. People are assigned usernames and passwords, and files and folders are configured to be accessible only to certain users or user groups.

There are many different methods of authentication, but passwords are one of the oldest and most frequently implemented. If I want to install a new package on my Linux desktop, I’d better know my root password! An attempt by a cyber attacker to privilege escalate within my operating system may entail trying to crack my root password. This is why organizations spend lots of money and resources to make sure that only authorized users have access to their authentication credentials. These user identities can apply to individual devices, local networks, wide area networks, online services, and cloud networks of all kinds.

Users have identities, but so do machines, including those in the cloud. A classic type of machine identity is a TLS certificate for an HTTPS website, or any other sort of TLS/SSL encrypted internet service. Code-signing certificates are machine identities that help to verify that software is authentic and legitimate. Also, machine identities, such as SSH keys can help assure that only authorized clients can securely gain remote access to sensitive computer systems via the SSH protocol.But what I’d most like to talk about today is howTLS certificates can be used asmachine identities for microservices and containers within cloud networks.


Want a More Secure, More Effective Cloud? Watch Your Machine Identities.
Learn new ways of protecting machine identities.

Attend a livestreaming event on December 13


Want a More Secure, More Effective Cloud? Watch Your Machine Identities.
Learn more about machine identity protection.

Explore now.

Recent Articles By Author

Machine Identity Protection Development Fund: Our First Three Developers 3 Predictions: What Will Happen to Machine Identities in 2019 We’re on the Cusp of the 4th Industrial Revolution, or Industry 4.0 More from kdobieski

*** This is a Security Bloggers Network syndicated blog from Rss blog authored bykdobieski. Read the original post at: https://www.venafi.com/blog/want-more-secure-more-effective-cloud-watch-your-machine-identities


Viewing all articles
Browse latest Browse all 12749

Latest Images

Trending Articles





Latest Images