For instance, what can you do to harden the security at your network endpoints at a time when more applications and systems are moving off-premises to public clouds and Software as a Service providers where you have less control?
What about faculty and staff turnover? Do you really know if you’ve removed all the security accesses and permissions for every instructor who has left the system or taken a leave of absence?
In both cases, IT leaders are likely to acknowledge that their colleges face potential security holes. Unfortunately, security breach perpetrators know this too.
CIEM: A Revised Approach to Higher Education Cybersecurity
Historically, universities have used identity and access management to manage and control user access, whether that access is to internal network resources or to the cloud. The beauty of IAM is that security managers obtain a single pane of glass view of all user access and permissions, whether they occur internally or on the cloud.
Cloud infrastructure entitlement management is a security management technology that is specifically dedicated to cloud user access and permission management. It does not manage internal network access. The disadvantage of CIEM is that it is unable to provide security management with a universal view of total user access and permissions activity; it manages the cloud only.
RELATED: How to approach higher education’s hybrid cloud migration.
That being said, there are good reasons colleges should consider bringing on CIEM to complement their existing security tools, including IAM.
First, by continuing with IAM, IT workers should be able to maintain their universal view of everything that happens within their environment, whether user access is occurring on internal networks or in the cloud.
Second, by adding CIEM, staffers gain security management capabilities in the cloud that IAM doesn’t have. This is especially important as more core IT is moving to the cloud. In a CIEM environment, IT security teams are delivered more granular views of cloud security, which helps to ensure that users only have access to the cloud-based resources they are authorized to access.