Magazine Button
Centrify joins multiple working groups within Cloud Security Alliance

Centrify joins multiple working groups within Cloud Security Alliance

CloudEnterprise SecurityMore NewsNetworking

Centrify, a leading provider of cloud-ready zero trust privilege to secure modern enterprises, has announced that several of its executive leaders have joined key working groups within the Cloud Security Alliance (CSA), the world’s leading organisation dedicated to defining standards, certifications and best practices to help ensure a secure cloud computing environment.

CSA working groups are the go-to source for best practices, research and tools for providing security assurance and privacy in the cloud. Centrify is proud to have joined the following CSA working groups:

  • The Hybrid Cloud Security Services Working Group. This working group proposes to provide suggestions on hybrid cloud governance, hybrid cloud threat profiles and hybrid cloud security evaluation, guiding both users and cloud service providers to choose and provide secure hybrid cloud solutions, and promoting security planning and implementation.
  • The Software Defined Perimeter Working Group. This research working group was established in 2013 with the goal to develop a solution to stop network attacks against application infrastructure. It is the main CSA working group tackling zero trust practices.
  • The DevSecOps Working Group. This working group focuses on creating a transparent and holistic management approach that leverages the synergies between the development, security and operational functions, making way towards a proactive and agile security stance.
  • The Containers and Microservices Working Group. This working group conducts research on the security of application containers and microservices and publishes guidance and best practices for the secure use of application containers and microservices.

Centrify brings its deep expertise in Privileged Access Management (PAM) to these CSA working groups.

The modern threatscape in the cloud is very different to when privileged access was confined to on-premises systems and resources that were under an organisation’s direct control.

While common security models should be applied to the cloud as they are on-premises, workloads running in the cloud require new solutions for least access and least privilege that are more dynamic and less reliant on managing shared accounts and static passwords.

IT decision makers are prioritising PAM as a critical security effort when faced with a rapidly-evolving and expanding threatscape, including hybrid and multi-cloud environments.

“Centrify’s participation in CSA underscores the company’s deep commitment to advancing cloud security, specifically creating awareness about the increasing need to protect cloud infrastructure and workloads with Zero Trust Privilege,” said Nate Yocom, CTO of Centrify.

“Centrify is excited join these critical working groups within CSA to give back to the industry, bring decades of experience with identity and access controls, and help organisations address modern, diverse IT environments and evolving attack surfaces.”

Browse our latest issue

Magazine Cover

View Magazine Archive