{"id":120471,"date":"2020-10-22T18:00:53","date_gmt":"2020-10-23T01:00:53","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=120471"},"modified":"2020-10-26T14:20:19","modified_gmt":"2020-10-26T21:20:19","slug":"cloud-ciem","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2020\/10\/cloud-ciem\/","title":{"rendered":"What to Know About Cloud Infrastructure Entitlement Management (CIEM)"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Effective cloud native security relies on <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/10\/cloud-iam-misconfiguration-risks\/\"><span style=\"font-weight: 400;\">properly administering identity and access management (IAM) policies<\/span><\/a><span style=\"font-weight: 400;\"> to users, workloads and data (also called entitlements). As cloud adoption continues to grow rapidly (Gartner forecasts that worldwide public cloud revenue will <\/span><a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2019-11-13-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-17-percent-in-2020\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">grow 17% in 2020<\/span><\/a><span style=\"font-weight: 400;\">), and given that resources are often created and spun down in a matter of hours or even minutes, a challenging reality has emerged for security teams \u2013 cloud infrastructure entitlement management (CIEM) is complicated and difficult to get right.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Further complicating effective entitlement management is the fact that most organizations utilize multiple cloud service providers, each with its own definitions and rules for entitlements. <\/span><a href=\"https:\/\/www.gartner.com\/en\/documents\/3986121\/managing-privileged-access-in-cloud-infrastructure\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">According to Gartner<\/span><\/a><span style=\"font-weight: 400;\">, \"<\/span><i><span style=\"font-weight: 400;\">by 2023, 75% of security failures will result from inadequate management of identities, access, and privileges, up from 50% in 2020.\"<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">To address these challenges and continue our commitment to bring our customers the most <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/10\/cloud-evolution-comprehensive-cnsp\/\"><span style=\"font-weight: 400;\">comprehensive cloud native security platform<\/span><\/a><span style=\"font-weight: 400;\">, Prisma Cloud supports a number of identity-focused capabilities for stronger entitlement management.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">What is Cloud Infrastructure Entitlement Management?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">CIEM addresses cloud native security challenges of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/prisma-cloud\/iam-security-controls\/\"><span style=\"font-weight: 400;\">managing IAM in cloud environments<\/span><\/a><span style=\"font-weight: 400;\">. These challenges are often too complex and dynamic to be managed effectively by the native tools provided by cloud service providers (CSPs). The emerging CIEM category defines technologies that provide identity lifecycle and access governance controls, which ultimately reduce excessive cloud infrastructure entitlements and streamline least-privilege access controls across dynamic, distributed cloud environments (the principle of least privilege refers to limiting permissions for users to the bare minimum they need).<\/span><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Challenges to Entitlement Management<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">In addition to dealing with the complex and dynamic environment in which cloud native technologies operate, a CIEM solution should also address <\/span><b>privileged access management<\/b><span style=\"font-weight: 400;\"> and <\/span><b>identity governance and administration<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<figure id=\"attachment_120485\" aria-describedby=\"caption-attachment-120485\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:84.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-120485 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/10\/challenges.png\" alt=\"Key Challenges in Cloud Infrastructure Entitlement Management, marked dark blue for Privileged Access Management and light blue for Identity Governance and Administration. \" width=\"900\" height=\"758\" \/><\/span><\/div><figcaption id=\"caption-attachment-120485\" class=\"wp-caption-text\">The challenges addressed by a CIEM solution.\u00a0<br \/>Source: Gartner: \u201cManaging Privileged Access in Cloud Infrastructure\u201d June 9, 2020.<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">For privileged access management, a CIEM should:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Monitor and prevent entitlement misuse.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Assess the necessary duration of entitlements.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Address the prolific nature of cloud entitlements.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">For identity governance and administration, a solution should cover:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Visibility, governance and compliance oversight.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Monitoring excessive and risky entitlements.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Rightsizing automation.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2><span style=\"font-weight: 400;\">CIEM and the Cloud Native Security Platform<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">CIEM represents an essential pillar of the <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\"><span style=\"font-weight: 400;\">Cloud Native Security Platform<\/span><\/a><span style=\"font-weight: 400;\"> (CNSP), one which specifically addresses organizations\u2019 need to ensure that privileged accounts and entitlements across their cloud infrastructure are consistently managed and assigned following the principle of least\u00a0 privilege. Because the CNSP combines CIEM with the functionality of <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2020\/05\/cloud-secure-cloud-native-applications\/\"><span style=\"font-weight: 400;\">cloud security posture management (CSPM)<\/span><\/a><span style=\"font-weight: 400;\">, Prisma Cloud can correlate identity information with configuration data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This powerful depth of visibility and control enables unparalleled protection. Take, for example, the AWS S3 storage service \u2013 the Prisma Cloud Data Security module can discover and identify sensitive data, the CSPM capability can calculate true internet exposure, and the CIEM capability can provide granular insights into exactly who has access to the data and make appropriate recommendations to enforce least-privilege access.\u00a0\u00a0<\/span><\/p>\n<figure id=\"attachment_120498\" aria-describedby=\"caption-attachment-120498\" style=\"width: 900px\" class=\"wp-caption aligncenter\"><div style=\"max-width:100%\" data-width=\"900\"><span class=\"ar-custom\" style=\"padding-bottom:35.56%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"wp-image-120498 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/10\/pillars.png\" alt=\"The four pillars of the Cloud Native Security Platform include Cloud Security Posture Management, Cloud Workload Protection, Cloud Network Security and Cloud Infrastructure Entitlement Management\" width=\"900\" height=\"320\" \/><\/span><\/div><figcaption id=\"caption-attachment-120498\" class=\"wp-caption-text\">The four pillars of the Cloud Native Security Platform<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<h5><strong>How to Implement CIEM Functionality<\/strong><\/h5>\n<p><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/prisma\/cloud\/identity-access-management-security\"><span style=\"font-weight: 400;\">Identity and Access Management (IAM)<\/span><\/a><span style=\"font-weight: 400;\"> module for Prisma Cloud will become generally available (GA) toward the end of 2020. This new feature set helps customers build a more identity-centric view of their cloud infrastructure entitlements, understand appropriate access and efficiently remove and adjust unneeded entitlements in line with CIEM challenges.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about the capabilities in the upcoming Prisma Cloud IAM module, read \u201c<\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/prisma-cloud\/IAM-security-controls\/\"><span style=\"font-weight: 400;\">IAM Security Controls to Protect Cloud Entitlements<\/span><\/a><span style=\"font-weight: 400;\">.\u201d<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud Infrastructure Entitlement Management (CIEM) represents an essential pillar of the Cloud Native Security Platform (CNSP).<\/p>\n","protected":false},"author":656,"featured_media":120517,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[7340,7341,6901,117],"coauthors":[6809],"class_list":["post-120471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-ciem","tag-cloud-infrastructure-entitlement-management","tag-cloud-native-security-platform","tag-gartner","cloud_sec_category-devsecops"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/10\/coding-blog.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/120471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/656"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=120471"}],"version-history":[{"count":8,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/120471\/revisions"}],"predecessor-version":[{"id":120569,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/120471\/revisions\/120569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/120517"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=120471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=120471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=120471"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=120471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}