Essays about: "Cloud Access Management"

Showing result 1 - 5 of 44 essays containing the words Cloud Access Management.

  1. 1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Nithya Sree Muddychetty; [2024]
    Keywords : Access Control Lists; Identity Access Management; Multi-Factor Authentication; One time password; Single sign on; System Usability Scale; Virtual private network;

    Abstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE

  2. 2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution

    University essay from KTH/Hälsoinformatik och logistik

    Author : Victor Pero; Linus Ekman; [2023]
    Keywords : Zero Trust; GitLab; Keycloak; OpenVPN; data protection; network security; access control; Zero Trust; GitLab; Keycloak; OpenVPN; dataskydd; nätverkssäkerhet; åtkomstkontroll;

    Abstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE

  3. 3. Tenant Separation on a multi-tenant microservice platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Axel Sandqvist; [2023]
    Keywords : multitenancy; multi-tenant; multitenant; cloud; cloud storage; IAM; Access control; Technology and Engineering;

    Abstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE

  4. 4. Informal Knowledge Sharing : Grasping the Complexity of Sharing Knowledge in Ericsson’s Software Development

    University essay from Linköpings universitet/Projekt, innovationer och entreprenörskap

    Author : Arvid Wittwång; Amanda Perlind; [2023]
    Keywords : Knowledge; Knowledge Management; Knowledge Sharing; Informal Knowledge Sharing; Knowledge Sharing Culture; Information; Electronic Knowledge Network; Digital Tools; Software Development; Product Development; Ericsson; Cloud RAN; 5G; Case Study; Multi-Grounded Theory; Grounded Theory;

    Abstract : Many organizations have realized the importance of managing what they know in a proper way, with the sharing of knowledge as one of the most central aspects. However, the practices of knowledge sharing are seldom fully understood, and thus implementations of technical systems intended to improve knowledge sharing have less effect than expected. READ MORE

  5. 5. Attack Surface Management : Principles for simplifying the complexity of OT security

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Jyotirmay Veshne; [2023]
    Keywords : OT; ICS; SCADA; CPS; IIoT; IoT; Attack Surface; MES; Attack Surface Management; Security; Remote connectivity;

    Abstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE