Essays about: "Cloud Access Management"
Showing result 1 - 5 of 44 essays containing the words Cloud Access Management.
-
1. A Comparative Analysis of SecurityServices Using Identity and AccessManagement (IAM)
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Background: Identity and Access Management (IAM) is a critical IT securityframework for managing digital identities and resource access. With roots datingback to ancient civilizations, IAM has evolved from basic authentication to sophisticated methods. READ MORE
-
2. Implementing a Zero Trust Environmentfor an Existing On-premises Cloud Solution
University essay from KTH/Hälsoinformatik och logistikAbstract : This thesis project aimed to design and implement a secure system for handling and safeguarding personal data. The purpose of the work is to prevent unauthorized actors from gaining access to systems and data. The proposed solution is a Zero Trust architecture which emphasizes strong security measures by design and strict access controls. READ MORE
-
3. Tenant Separation on a multi-tenant microservice platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Axis Communications wishes to investigate their PaaS system, Axis Connected Services(ACX), with regard to separation of the tenants of the platform to ensure the implemented separation technologies are used correctly and to find out whether more separation is necessary. ACX ties together several previously separate services under a single umbrella, with the goal of improving usability and increasing inter-service functionalities and centralisation of the software products Axis has developed for their devices. READ MORE
-
4. Informal Knowledge Sharing : Grasping the Complexity of Sharing Knowledge in Ericsson’s Software Development
University essay from Linköpings universitet/Projekt, innovationer och entreprenörskapAbstract : Many organizations have realized the importance of managing what they know in a proper way, with the sharing of knowledge as one of the most central aspects. However, the practices of knowledge sharing are seldom fully understood, and thus implementations of technical systems intended to improve knowledge sharing have less effect than expected. READ MORE
-
5. Attack Surface Management : Principles for simplifying the complexity of OT security
University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknikAbstract : Purpose: Operational technology (OT) environments face significant risks and threats stemming from Industry 4.0. The security landscape for OT is confronted with unprecedented challenges due to the expanding attack surface resulting from factors like cloud adoption, Industrial Internet of Things, and increased mobility. READ MORE