c
July 18, 2022, 12:30 a.m. |

Cloud Security Alliance cloudsecurityalliance.org

This is Part 5 of our ‘What is IAM’ blog series. Written by Paul Mezzera, Ravi Erukulla, and Ramesh Gupta of the CSA IAM Working Group. IAM Stakeholders Though IAM is typically known as an IT or Information Security discipline, IAM touches pretty much every individual and resource associated with an organization, whether associated directly or indirectly. Business users—both employees and their managers—that need to access a company’s resources go through IAM processes to do this securely. So...

challenges iam

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Security Consultant

@ Auckland Council | Central Auckland, NZ, 1010

Security Engineer, Threat Detection

@ Stripe | Remote, US

DevSecOps Engineer (Remote in Europe)

@ CloudTalk | Prague, Prague, Czechia - Remote

Security Architect

@ Valeo Foods | Dublin, Ireland

Security Specialist - IoT & OT

@ Wallbox | Barcelona, Catalonia, Spain