<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Cloudentity on Medium]]></title>
        <description><![CDATA[Stories by Cloudentity on Medium]]></description>
        <link>https://medium.com/@gabe_14883?source=rss-b77c1f7be885------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/1*dmbNkD5D-u45r44go_cf0g.png</url>
            <title>Stories by Cloudentity on Medium</title>
            <link>https://medium.com/@gabe_14883?source=rss-b77c1f7be885------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Sun, 17 May 2026 19:15:15 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@gabe_14883/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Press Release: Cloudentity and Signal Sciences Join Forces to Provide a Comprehensive Approach to…]]></title>
            <link>https://medium.com/cloudentity/press-release-cloudentity-and-signal-sciences-join-forces-to-provide-a-comprehensive-approach-to-54b44d10f4ac?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/54b44d10f4ac</guid>
            <category><![CDATA[information-technology]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[devops]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Thu, 13 Feb 2020 14:24:01 GMT</pubDate>
            <atom:updated>2020-03-25T22:13:06.608Z</atom:updated>
            <content:encoded><![CDATA[<h3>Press Release: Cloudentity and Signal Sciences Join Forces to Provide a Comprehensive Approach to API Security</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/480/0*liuy_iLG3LMI-FKI.png" /></figure><p><strong>Seattle, WA February 13, 2020</strong> — <a href="https://cloudentity.com/">Cloudentity </a>today announced a partnership with <a href="https://www.signalsciences.com/">Signal Sciences </a>, the world’s fastest growing web application security company, to provide a holistic approach for enterprise companies looking to secure their web applications and APIs. By combining Signal Sciences’ award-winning next-gen <a href="https://www.signalsciences.com/products/waf-web-application-firewall/">Web Application Firewall </a>(WAF) with Cloudentity’s expertise in API Identity and Authorization, enterprise customers can protect themselves from major cyber security risks, including all 10 of the most critical risks in API security as published by the Open Web Application Security Project (OWASP).</p><p><strong>Visit Cloudentity and </strong><a href="https://www.signalsciences.com/about-us/events/"><strong>Signal Sciences </strong></a><strong>(Booth #461) at RSA on February 24–28, 2020 in San Francisco to learn more. For more information, visit </strong><a href="https://www.signalsciences.com/blog/rsa-conference-2020-human-element/"><strong>https://www.signalsciences.com/blog/rsa-conference-2020-human-element/</strong></a></p><p>A recent report published by Gartner* found that “by 2023, over 50% of B2B transactions will be performed through real-time APIs versus traditional approaches, which today make up over 80% of B2B transactions.” We believe this increased reliance on APIs has not only allowed for greater efficiencies but has added complexity and risk to most organizations.</p><p>“We saw a massive increase in API attacks during 2019 and know that as customers adopt the API economy as part of their Digital Transformation efforts API abuse will be the most common attack vector for data breaches and hacks,” said Nathanael Coffing, Co-Founder and Chief Strategist of Cloudentity, “by partnering with best-in-class companies like Signal Sciences our customers are prepared for this future.”</p><p>“As a key component of business innovation and software development, the importance of incorporating API security into any strategic security plan cannot be overstated,” said Zane Lackey, CSO and Co-Founder of Signal Sciences. “The combination of Signal Sciences and Cloudentity provides a powerful end-to-end solution to help companies effectively protect their APIs and mitigate the latest attacks.”</p><p><strong>About Cloudentity</strong></p><p>Cloudentity’s Authorization Control Plane and MicroPerimeter™ provide unparalleled API visibility and protection at scale, complementing Signal Sciences next-gen WAF in cloud-native and traditional application architecture; providing an integrated risk based approach to API security and governance.</p><p>* <em>Gartner, “Critical Capabilities for Full Life Cycle API Management”, Mark O’Neill, Paolo Malinverno, Aashish Gupta, 21 October 2019</em></p><p><strong>About Signal Sciences</strong></p><p><a href="https://cloudentity.com/">Cloudentity </a>is a privacy-first Customer Identity and Access Management (CIAM) platform focused on providing the right people the right data at the right time and place. This is done through powerful, cloud-native identity and access control microservices that integrate quickly, seamlessly, and efficiently into an organization’s existing hybrid, or cloud architecture. Cloudentity’s API MicoPerimeter™ provides in-depth visibility, protection, and policy enforcement at the API level, securing web applications from malicious attacks.</p><p>For more information visit <a href="https://cloudentity.com/">Cloudentity.com </a>or connect on LinkedIn at <a href="http://www.linkedin.com/company/cloudentityteam/">www.linkedin.com/company/cloudentityteam/</a></p><p>Signal Sciences is the fastest growing web application security company in the world. With its award-winning <a href="https://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.signalsciences.com%2Fwaf-web-application-firewall%2F&amp;esheet=51935790&amp;newsitemid=20190205005302&amp;lan=en-US&amp;anchor=next-gen+WAF&amp;index=23&amp;md5=6cb417b602c9923245fb6963fd16e82d">next-gen WAF </a>and solution, Signal Sciences protects more than 32,000 applications and over a trillion production requests per month. Signal Sciences patented architecture provides organizations working in a modern development environment with comprehensive and scalable threat protection and security visibility. The company works with some of the <a href="https://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.signalsciences.com%2Fcustomers%2F&amp;esheet=51935790&amp;newsitemid=20190205005302&amp;lan=en-US&amp;anchor=world%27s+most+recognizable+companies&amp;index=25&amp;md5=cf6fc271cbf348020f2778bcb0db572d">world’s most recognizable companies </a>, like Under Armour, Aflac and WeWork, across industries, including five of the top ecommerce companies, five of the largest software companies, in addition to many others in the financial services, retail, healthcare, media and entertainment, and government sectors. Signal Sciences is also the recipient of <a href="https://www.infoworld.com/article/3251828/infoworlds-2018-technology-of-the-year-award-winners.html#slide24">InfoWorld’s Technology of the Year </a>and <a href="https://events.computing.co.uk/devopsexcellence/static/2018-winners">Computing’s DevOps Excellence Award for Best DevOps Security Tool </a>. For more information, visit <a href="https://cts.businesswire.com/ct/CT?id=smartlink&amp;url=https%3A%2F%2Fwww.signalsciences.com%2F&amp;esheet=51935790&amp;newsitemid=20190205005302&amp;lan=en-US&amp;anchor=Signal+Sciences&amp;index=26&amp;md5=b7d68c4ce7e8a15389330e98e54c1f64">Signal Sciences </a>or follow <a href="https://twitter.com/signalsciences">@SignalSciences </a>.</p><p>SOURCE: Cloudentity Inc.</p><p>To learn more, read how it works here: <a href="https://cloudentity.com/signal-sciences/">https://cloudentity.com/signal-sciences/</a></p><p><em>Originally published at </em><a href="https://cloudentity.com/press-release-cloudentity-and-signal-sciences-join-forces-to-provide-a-comprehensive-approach-to-api-security/"><em>https://cloudentity.com</em></a><em> on February 13, 2020.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=54b44d10f4ac" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/press-release-cloudentity-and-signal-sciences-join-forces-to-provide-a-comprehensive-approach-to-54b44d10f4ac">Press Release: Cloudentity and Signal Sciences Join Forces to Provide a Comprehensive Approach to…</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Dynamic Data Sharing Agreements and Progressive Consent]]></title>
            <link>https://medium.com/cloudentity/dynamic-data-sharing-agreements-and-progressive-consent-7ee1fdc463b8?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/7ee1fdc463b8</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Tue, 26 Nov 2019 05:33:51 GMT</pubDate>
            <atom:updated>2020-03-25T22:15:57.239Z</atom:updated>
            <content:encoded><![CDATA[<p>Consumers are increasingly demanding companies become more thoughtful with their privacy and data. The fact that companies like Facebook have failed to put proper safeguards on “who sees what when” has created an increase in consumer data protection laws driven by the very subjects of that data — people.</p><p>Of course, it’s almost impossible for consumers to understand what they have granted access to — data sharing agreements are nested within current agreements that are already impossible to interpret. These issues are driving consumer data privacy to the forefront of every business conversation.</p><p>In fact, Garnter says that the concept of “Privacy-First” is becoming as important as other socially responsible labels such as organic or animal cruelty labeling.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/974/0*PY1ZYuSiXUe19IZ1.png" /></figure><p>Regulations such as GDPR, Open Banking and CPAA all require a level of <em>dynamic</em> data sharing critical to companies use. That is, a single click (like friending someone on Facebook) can no longer grant broad access to other people and organizations in perpetuity. Consumers, and the regulations that enforce these consumer desires, need to be able to know explicitly who gets to see their data, how it will be used, and for how long.</p><p>Dynamic privacy involves consent and enforcement — a third-party application needs to be granted consent by the consumer managed by the CIAM system and that consent needs to be consumed and enforced.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/520/0*1koDMEw05nWpwYnV.png" /></figure><p>Let’s say the consumer wants to share data from their bank with our fictional “Financroo” finance application. The consumer grants this permission in the trusted CIAM system — it’s not simply a matter of handing over <em>all</em> access to the consumer’s account, but letting the consumer choose what data will be made available to the application and for how long.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/622/0*tx_IAt4U9S5R7VRM.png" /></figure><p>Note that the consumer is given options for fine-grained access, the app can see the profile and account information for a credit card, for example, but it cannot initiate payments. Even more importantly, the consent has an expiration date — access shouldn’t be granted forever (as we often forget we even granted it), and the consumer should be able to specify when that access will be revoked automatically.</p><p>Then even finer grained consent for individual accounts can be applied, creating finer and finer grained access based on the intent of the consumer’s interaction with the application.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/541/0*wUJv80GUOaFeZovh.png" /></figure><p>The Banking API administrator should be able to interact with the available permissions, not only adding required and optional data that can be shared but adding and describing the risk in certain kinds of grants to help the consumer understand the risks before granting access to third parties.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/968/0*iGCg0tSAKEDCUZxl.png" /></figure><p>Now the app gets a new token and is able to connect to the banking API within the constraints provided by the CIAM Privacy service. Rather than giving an app broad access, this separation of responsibilities (the 3 rdparty application, CIAM service, and secure banking services) limits exposure to specific data that the consumer has explicitly granted access, limits for how long that access is granted and consolidates control in the consumer’s hands.</p><p>And it’s not just that the consumer has granted access — we also have to take into account when consumers revoke consent. Because the enforcement is aware of the changes in realtime, the revocation is as simple and seamless as granting access.</p><p>At the end of the day, consent isn’t just a yes/no gate, it’s a series of interactions that consider the intent of the application, the privacy of the consumer, and the changing nature of the relationship that can be easily enforced in distributed environments and multi-cloud ecosystems. We live in a dynamic, changing world and the tools we use to interact with that world need to be able to keep up with that change.</p><p><em>Originally published at </em><a href="https://cloudentity.com/dynamic-data-sharing-agreements-and-progressive-consent/"><em>https://cloudentity.com</em></a><em> on November 26, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7ee1fdc463b8" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/dynamic-data-sharing-agreements-and-progressive-consent-7ee1fdc463b8">Dynamic Data Sharing Agreements and Progressive Consent</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[OAuth at 100, 200…500k flows per second and Beyond]]></title>
            <link>https://medium.com/cloudentity/oauth-at-100-200-500k-flows-per-second-and-beyond-1fc8af85f616?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/1fc8af85f616</guid>
            <category><![CDATA[oauth]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[api]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Thu, 21 Nov 2019 00:19:00 GMT</pubDate>
            <atom:updated>2020-03-25T22:15:45.842Z</atom:updated>
            <content:encoded><![CDATA[<figure><img alt="" src="https://cdn-images-1.medium.com/max/438/0*aAN7x_oR8BZyo3UF.png" /></figure><p>OAuth and OIDC have become the center point of any API and Identity infrastructure. OAuth2 created a framework allowing every user, device, person, service and thing to support their own distributed means of delegated authorization using a combination of scopes and grants. From smart speakers to connected cars, OAuth and APIs connect everything in the modern world providing a common sinew for interconnectivity and must be secured.</p><p>In doing so the industry has put developers into the middle of the security discussion exposing a major shortcoming of legacy IAM providers and API Gateways even while they promote their latest version(s) shouting “future-proof “and “modernization” from the rooftops.</p><p>Due to the adoption of the standard and the availability of OAuth clients, the requirements for OAuth servers has changed drastically. No longer are a few simple flows, long lived sessions or opaque tokens sufficient.</p><p><strong>Instead,</strong> OAuth servers must: <strong>Scale massively.</strong> <br> At Cloudentity we’ve had a dozen new customers approach us with OAuth token minting needs ranging from 100,000 flows per second all the way up to a half million and that’s for today’s loads. (Black Friday anyone?)</p><p>The monolithic vendors release specs (when they’re willing to) that show that, under the most ideal conditions, on their extra-large platforms, under the most ideal scenarios and not running any other functions, 4000 flows per second with significant customer loss generating latency (caused by LDAP, garbage collection and inefficient API calls.)</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1000/0*qPaip8eqq918ojOT.png" /></figure><p><strong>Provide Multi-Tenancy</strong> <br> Businesses are setup to leverage common services with common security mechanisms and standardized methods of approaching authorization and privacy data. Delegated Administration is no longer a nice-to0-have but a <strong>must</strong> as companies create new platforms for engaging with their partners, customers and even internal business units</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*s9LgS9yocbrBm3Y8.png" /></figure><p><strong>Engage Developers to enable DevSecOps</strong> <br> Providing a multi-tenant developer portal is Step One for OAuth service/client onboarding. Other key aspects include a robust set of extensible APIs and microservices to support the services they are building. Then it’s important to make their jobs easier by reducing the amount of code they need to create. Offloading authorization, privacy and consent management, sensitive data usage and providing everything in a very succinct “authorization as code” interface gives developers the functions they need to bring products to market faster and more securely without having to learn the intricacies of OAuth, LDAP, SCIM, SAML or compliance requirements like CCPA and GDPR.</p><p><strong>Provide Scope and Policy Governance</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*K_DSFocM2FKLhjqx.png" /></figure><p>Given the sensitivity of data APIs are moving between businesses, customers and partners and the global regulatory environment, its no longer permissible to allow every development team to build its own solutions. This leads to scope propagation, no understanding how sensitive data flows between APIs or what/when authorization policies are protecting them. Providing real time security and governance updates to the CISO and Data privacy Officer has become a hard requirement and commonizing that across internal and external development teams is the exact reason CIAM.next was built.</p><p>The days of compromise in your OAuth and security solutions is over. It’s no longer a decision of whether to shut off security controls, increasing token duration or utilize one-off approaches for managing sensitive data with scopes and grants.</p><p><strong>Deploy on our cloud or yours</strong> <br> <a href="https://cloudentity.com/identity-management/">CIAM.next</a> approached it differently using stateless microservices and APIs to build a multi-cloud authorization control plane. Our goal from its inception was planet scale, simplifying the developer experience, making externalizing authorization and adding governance in a manner that provides distributable identity microservices that work in concert with your distributed apps, APIs, microservices and functions</p><p><em>Originally published at </em><a href="https://cloudentity.com/oauth-at-100-200-500k-flows-per-second-and-beyond/"><em>https://cloudentity.com</em></a><em> on November 21, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=1fc8af85f616" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/oauth-at-100-200-500k-flows-per-second-and-beyond-1fc8af85f616">OAuth at 100, 200…500k flows per second and Beyond</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Securely Modernizing traditional applications into multi-cloud aware services using CIAM.next]]></title>
            <link>https://medium.com/cloudentity/securely-modernizing-traditional-applications-into-multi-cloud-aware-services-using-ciam-next-67929fefb4f7?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/67929fefb4f7</guid>
            <category><![CDATA[identity-management]]></category>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[api]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Wed, 13 Nov 2019 01:30:37 GMT</pubDate>
            <atom:updated>2020-03-25T22:15:28.205Z</atom:updated>
            <content:encoded><![CDATA[<h3>Securely Modernizing traditional applications into multi-cloud aware services using CIAM.next &amp; HashiCorp Consul</h3><p>Organizations are developing and deploying distributed services across the hybrid cloud and are facing four major issues which we will be addressing in this two-part series.</p><ol><li>Bridging traditional and cloud-native API services with an identity-centric security and request routing</li><li>Standardized approach for authorization and sensitive privacy data security in cloud-first organizations</li><li>Meeting compliance standards for authorization and privacy during the transition to cloud-first services</li><li>Declarative API access control, DevSecOps model for simplifying the developer usage of identity, authorization and delivery</li></ol><p><strong>Identity-centric security and request routing for hybrid cloud services<br> </strong>The first step for addressing security, authorization and privacy in hybrid cloud infrastructures is updating the notion of identity. Forward-looking organizations are moving past the “futureproof &amp; modernization” marketing strategies of legacy identity providers and realizing the underlying data model of user-centric identity platforms wasn’t designed for the cloud-native world. Thus, step one is to envelop the traditional user-centric IAM products into a model that creates identities for every entity: user, service, device &amp; data.</p><p>The new baseline provides the ability for every service, user, persona and device to assume its own unique identity and manage access for those identities in a singular Identity &amp; Authorization Control Plane. Accomplishing this drastically simplifies and standardizes other infrastructure issues like service discovery, service registry and secret storage for organizations leveraging platform agnostic multi-cloud architecture.</p><p>Most companies approach the process of modernizing legacy application and Identity platforms with cloud-native microservices in a gradual lift and shift process</p><p>The following diagram details how the Authorization Control Plane applies consistent identity, authorization and audit across traditional and microservice based services; immutably maintaining API security, data level permissions/consent and GDPR/CCPA/NYDFS compliance on any workload during the application decomposition and microservice adoption process.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*sMd3HFuDZmZc-sFr.png" /></figure><p><strong>Authorization Control Plane: Hashicorp Consul &amp; CIAM.next<br> </strong>The journey starts by creating service identities for microservices and legacy-apps using Consul and CIAM.next MicroPerimeter™ security. This prepares apps to join the Authorization Control Plane by adding service identity, instrumentation, inspection and declarative authorization to the workload.</p><p>Creating a declarative security layer that provides granular endpoint level access control by externalizing authorization for networking, securing communication channel via TLS, delivering standards based (FIDO/OAuth/OIDC) Authentication and privacy based data attribute authorization in a very lightweight package (&lt;10Mb) with sub millisecond latency.</p><p><strong>Step One Vault &amp; MicroPerimeter™ — Bootstrap the service identity<br> </strong>In order to properly apply identity and microservice specific authorization/audit policies the MicroPerimeter™ generates a secure identity through Vault for the application. To avoid code changes, the service itself is not involved in the process of obtaining identity nor is it required to be aware of its identity. The MicroPerimeter™/Vault work together to assign the SPIFFE compliant identity to a protected service and manages its certificate request and storage.</p><p>The identity assignment process differs slightly depending on the service architecture, although the high-level flow is virtually the same. The diagram below illustrates the process.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*6qhPmG3HFtwv6A7h.png" /></figure><p>More details on the Vault &amp; Cloudentity integration can be found here: <a href="https://docs.microperimeter.cloudentity.com/concepts/microperimeter_security/functionality/identity_bootstrapping/">https://docs.microperimeter.cloudentity.com/concepts/microperimeter_security/functionality/identity_bootstrapping/</a></p><p>The key generated per application instance provided by Vault is used for several aspects of MicroPerimeter™ functionality including:</p><ul><li>Cryptographically enforce identity of the service based on SPIFFE ID</li><li>Secure mTLS communication utilizing TLS v1.3</li><li>Digital Signature of the audit/access logs</li><li>Signing of the service and identity context fingerprints used for declarative authorization and PII permissions/consent evaluation</li></ul><p><strong>Step Two: Consul and Declarative Authorization provide the interconnect</strong></p><p>Once a service (micro or traditional) has a Vault assigned SPIFFE identity, its far easier to properly configure that service with the relevant networking, authorization, authentication and audit policies from Consul. This is a fundamental reconsideration of how to address coarse and fine grained authorization with a design that allows for both policies and policy decision points to be distributed to the edge of the service enhancing performance, security and latency.</p><p>Authorization policies are crafted in a centralized policy administration point with delegated administration to provide inheritable drag-and-drop Policy creation. The User Interface allows linking of different policy types together while creating authorization as code. Consul acts as the storage and distribution mechanism for these policies ensuring they are multi-cloud available. This promotes the move from the static approve/deny authorization paradigm of the last few decades and into a very dynamic and fluid authorization flows utilizing run-time attributes and temporal relationships for authorization decisions externalized from the service.</p><p><strong>Declarative Authorization: Immutable Policies as Code<br> </strong>The key to authorization in a multi-cloud world, comes directly out of the immutable services playbook. Authorization in a microservices world could no longer be modeled after the traditional monolithic Web access management (WAM) or API Gateway approach of applying authorization at defined ingress points. Authorization has been forced to mature in two major ways. First, authorization must be performed at both the ingress AND egress of the service itself. Secondly, authorization must be provided as Immutable code in the same way Infrastructure is in a cloud-native world.</p><p>The example below is a real-world example of the Consul distributed polices for the distributed policy decision points. The example shows how Networking, Oauth and Identity, fine grained attribute based and consent evaluation, for PII data access policies provide the security nexus; allowing transactions to be evaluated at the distributed edge of the service instead of in a centralized gateway.</p><p>Consul stores all of these authorization policy types as code, allowing developers to utilize the same security policies during development, sample the app using canary routing and then deploy into production — all distributed via the Consul control plane to the workload. Immutable distributed security attached to the distributed API endpoint.</p><p><strong>Policies Attached to the service’s API endpoint</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/850/0*QifVpZIrBi_ZAU1t.png" /></figure><p><strong>Policies Defined in Consul</strong></p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*Ds8HK5m2jdYp3XRd.png" /></figure><p>When authorization policies are tied to workloads and endpoints, Identity and API access control remains consistent from development to the final push into production. The security teams are able to define and create policies centrally through the UI and then development teams inherit those policies during the DevOps process. In doing so, security teams gain visibility and centralized management and Developers automatically adhere to corporate policies for PII privacy data management, Authentication, Authorization and Audit.</p><p>With Distributed enforcement, API endpoints are protected by the policies regardless of the application type (legacy vs microservices), hosting location (public cloud, private cloud, datacenter) or where they are instantiated.</p><p>Figure 1: Visual design.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*NeO8zgobLivdgoGn.png" /></figure><p>Figure 2: JSON representation</p><p>Combining the service identity with consul based declarative configuration for authorization and access policies enables the creation of the next generation of DevSecOps pipeline. That can be utilized to fully automate authentication, authorization, access control, as well as API publishing rules in your IT infrastructure.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*S16Hlg4GF9odBAlp.png" /></figure><p>Join us next week for the second part in this blog series. Using Vault and CIAM.next to analyze Privacy Data, Secret management and API governance into the Hybrid-cloud ecosystem.</p><p><em>Originally published at </em><a href="https://cloudentity.com/securely-modernizing-traditional-applications-into-multi-cloud-aware-services-using-ciam-next-hashicorp-consul/"><em>https://cloudentity.com</em></a><em> on November 13, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=67929fefb4f7" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/securely-modernizing-traditional-applications-into-multi-cloud-aware-services-using-ciam-next-67929fefb4f7">Securely Modernizing traditional applications into multi-cloud aware services using CIAM.next</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Cloudentity Releases CIAM.next,]]></title>
            <link>https://medium.com/cloudentity/cloudentity-releases-ciam-next-7cdd4c8d2a27?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/7cdd4c8d2a27</guid>
            <category><![CDATA[identity]]></category>
            <category><![CDATA[information-security]]></category>
            <category><![CDATA[information-technology]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Wed, 06 Nov 2019 02:07:12 GMT</pubDate>
            <atom:updated>2020-03-25T22:13:44.280Z</atom:updated>
            <content:encoded><![CDATA[<h3>Cloudentity Releases CIAM.next, a Microservices Based Consumer Identity Access Management Platform for Privacy, Consent, and Security</h3><figure><img alt="" src="https://cdn-images-1.medium.com/max/800/0*WO8ix9rJ1Tbg5E7Y.png" /></figure><p>Cloudentity Releases <strong>CIAM<em>.next</em></strong>, a Microservices Based Consumer Identity Access Management Platform for Privacy, Consent, and Security</p><p>CIAM.next is designed for zero-trust security by integrating Identity Access Management with consumer-focused progressive consent enforcement for legacy and hybrid cloud applications</p><p>FOR IMMEDIATE RELEASE</p><p><strong>SEATTLE</strong>, November 05, 2019 — Cloudentity’s new CIAM.next platform provides a generational shift in the consumer identity and access management market. Featuring a privacy-first platform built specifically for enterprises to enable strong data security while reducing the time IT development staff spend on managing security systems.</p><p>Intelligent and continuous authentication and authorization allows organizations to build secure Hybrid-Cloud applications leveraging Open Standards and microservices that enforce security policies on a transactional basis. The cloud-native CIAM.next platform helps customers protect billions of transactions with a focus on authorization as the security control plane.</p><p>“Privacy and data security technologies have not kept pace with the growing demands of consumers to control their own data,” said Cloudentity CEO Jasen Meece. “Cloudentity is solving the authorization problem in hybrid cloud environments with progressive consent tied to consumer choice.”</p><p>CIAM.next combines secure identity interactions between users, services and things with Cloudentity’s policy enforcement tools at the API level. With centralized policy management and distributed security enforcement, the platform meets the hyper-scale and performance capabilities of today’s global enterprises.</p><p>Features of the CIAM.next platform include:</p><ul><li><strong>Customizable User Journey: </strong>Cloudentity provides the first dynamic user journey with fully Configurable UI and CIAM.next’s microservice architecture, building registration and privacy data flows with a drag and drop process to easily enhance the user experience.</li><li><strong>“Bring your Own IDP” Identity management: </strong>The platform allows a user to combine identities from multiple upstream providers, such as legacy IDPs or modern social logins, generating a uniform source of truth to inform security policies.</li><li><strong>Multi Organizations/Delegated Admin: </strong>Modern organizations require the ability to quickly roll out new business processes via B2C, B2B2C and B2B2P relationships. next allows segmentation of administrative responsibility, security policies, privacy management and risk governance, all to mitigate the risk of data overexposure.</li><li><strong>Passwordless Login and MFA: </strong>next supports a range of MFA tools out of the box, including two types of passwordless and a “bring your own MFA” model, which are tightly integrated with Cloudentity’s API security. This simultaneously allows for more security and convenience for the consumer.</li><li><strong>Enhanced Identity and Enforcement: </strong>The platform supports industry standards such SAML, OAuth and OIDC and when coupled with Cloudentity’s API security tools, it provides out-of-the box support for granular security policies that protect application entitlements and individual customer.</li><li><strong>360° Audit: </strong>Combining CIAM data with policy enforcement data allows for end-to-end transaction logging, providing a clearer view to help refine security before a breach occurs and provide more visibility and a tamper-proof audit trail when evaluating a breach.</li></ul><p><strong>What our partners are saying:<br> </strong>“This is the most advanced CIAM solution for the cloud, with a true microservices enabled CIAM platform that delivers incredible value and powerful protection with a cost-effective secure solution,” said Jeremy Rohrs, vice president at SecZetta. “We are excited to offer our customers this industry-leading platform for effective and efficient external authorization.”</p><p>Toby Emden, Managing Director at Edgile said, “Over the past couple of years, we have seen exponential growth in client adoption of microservice-based applications, zero-trust architectures and CIAM. These trends are forcing identity professionals to view IAM very differently than in the past and devise radical new strategies to serving an increasingly complex client base.”</p><p>He goes on to say, “Cloudentity has anticipated this paradigm shift and developed an innovative approach to help organizations navigate today’s rapidly evolving identity landscape. Their API-centric, consumer focused approach to securing APIs, sensitive data assets, Internet-connected devices and PII is unique in how they view the need a of next-gen identity architectures.”</p><p>A complimentary demo of Cloudentity’s CIAM.next solution is available at <a href="https://cloudentity.com/">cloudentity.com</a> The company will also showcase the platform’s latest features in the Cloudentity hospitality suite on November 12 at TechVision Research Chrysalis, <a href="https://techvisionresearch.com/">techvisionresearch.com</a>.</p><p><strong>About Cloudentity</strong><a href="https://cloudentity.com">Cloudentity</a> is a privacy-first Customer Identity and Access Management platform. We secure, identify, and authorize users, services and things that need access to personally identifiable data and keep out those who should not have access. We do this with powerful, cloud-native identity and access control microservices that integrate quickly, seamlessly, and efficiently into an organization’s existing hybrid, or cloud architecture. We provide in-depth visibility, protection and policy enforcement at the API level.</p><p>For more information visit <a href="https://cloudentity.com/">Cloudentity.com</a> or connect on LinkedIn at <a href="http://www.linkedin.com/company/cloudentityteam/">www.linkedin.com/company/cloudentityteam/</a></p><p><strong>About SecZetta</strong><br> SecZetta leading provider of non-employee identity risk and lifecycle management software solutions. Companies work with SecZetta to gain full visibility and control of all their people, employees and non-employees alike. We make sure companies have an Identity Governance &amp; Administration program that delivers business value while protecting data and applications.</p><p>For more information visit <a href="https://seczetta.com/">seczetta.com</a>.</p><p><strong>About Edgile</strong><br> Edgile is the trusted cyber risk and regulatory compliance partner to the world’s leading organizations, providing consulting, managed services, and harmonized regulatory content. Our strategy-first model optimizes on-premises and cloud programs, IAM, GRC, and cybersecurity. By transforming risk into opportunity, we secure the modern enterprise through solutions that increase business agility and create a competitive advantage for our clients.</p><p>For more information visit <a href="https://edgile.com/">www.edgile.com</a></p><p><strong>Social Media Links:</strong></p><p><strong>Media Contact:<br> </strong>Amie Johnson for Cloudentity<br> (206) 299–1112<br> <a href="mailto:press@cloudentity.com">press@cloudentity.com</a></p><p><a href="https://www.linkedin.com/company/cloudentityteam">https://www.linkedin.com/company/cloudentityteam</a><br> <a href="https://www.instagram.com/cloudentityTEAM/">https://www.instagram.com/cloudentityTEAM/</a><br> <a href="https://www.youtube.com/channel/UCZZDuJKmqSHGi29KJcX-_fA/">https://www.youtube.com/channel/UCZZDuJKmqSHGi29KJcX-_fA/</a></p><p><em>Originally published at </em><a href="https://cloudentity.com/press-release-ciam-next/"><em>https://cloudentity.com</em></a><em> on November 6, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=7cdd4c8d2a27" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/cloudentity-releases-ciam-next-7cdd4c8d2a27">Cloudentity Releases CIAM.next,</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Press Release: Integris Software Partners with Cloudentity to Launch Industry-First Automated Data…]]></title>
            <link>https://medium.com/cloudentity/press-release-integris-software-partners-with-cloudentity-to-launch-industry-first-automated-data-a910f6a764f0?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/a910f6a764f0</guid>
            <category><![CDATA[privacy]]></category>
            <category><![CDATA[gdpr]]></category>
            <category><![CDATA[information-security]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Thu, 31 Oct 2019 19:00:10 GMT</pubDate>
            <atom:updated>2020-03-25T22:13:35.063Z</atom:updated>
            <content:encoded><![CDATA[<h3>Press Release: Integris Software Partners with Cloudentity to Launch Industry-First Automated Data Privacy and Security Solution For API-based Services</h3><p>Integris Software Partners with Cloudentity to Launch Industry-First Automated Data Privacy and Security Solution For API-based Services</p><p>Combined Solution Provides Ability to Identify, Track and Secure Data At-Rest and In-Motion, to help Ensure the Integrity of Data Sharing Agreements</p><p><strong>SEATTLE </strong>— October 30, 2019 — Cloudentity and Integris Software have formed a partnership to deliver the industry’s first solution to address the data privacy and security requirements for compliance, and modern API-based services. Together, the companies have set a new standard for visualizing where personal data is stored, which applications are accessing that data, and if the customer is granted consent.</p><p>The combined solution provides enterprises with the ability to identify, track and secure data at-rest and in-motion. Privacy and security need to be integrated to deliver complete data protection. Integris Data Privacy Automation discovers what data is important and why, enabling Cloudentity to be precise in its security and policy controls.</p><p>“The data that flows between business entities must be protected with better security and privacy controls,” said Nathanael Coffing, Founder, Cloudentity. “Our partnership with Integris allows organizations to intelligently protect personal identifiable information stored in any environment, including the cloud. Businesses use API-based transactions to exchange consumer data. We protect APIs, and transactions by authorizing the exchange of privacy information at a granular level. Our partnership is a next-generation consumer consent and privacy-aware microservice-firewall.”</p><p>Companies are constantly purchasing or exchanging data in order to build better customer profiles or complete a transaction. In a recent <a href="https://integris.io/data-privacy-maturity-study-2019/">Integris Software Data Privacy Maturity Study</a> of mid and large enterprises, 40 percent of respondents had 50 or more data sharing agreements (e.g., Cambridge Analytica) in place.</p><p>“Companies are being inundated with personal data. A single bank transaction might get replicated across a hundred data repositories and involve dozens of applications,” said Drew Schuil, vice president of Global Business Development and EMEA Operations for Integris Software. “In this environment, manual checks on privacy, security, and customer consent reach the breaking point. We are honored to partner with Cloudentity to help businesses solve this challenge, protect their data collections, and ensure compliance with privacy regulations.”</p><p>The joint solution provides the foundation for complying with California Consumer Privacy Act (CCPA) and other US state privacy laws and international laws including Europe’s General Data Protection Regulation (GDPR).</p><p><strong>Key capabilities of the joint solution include the ability to:</strong></p><ul><li>Discover, monitor, and protect personal information as it’s shared across an organization’s internal, partner, and consumer app ecosystems</li><li>Ensure that data sharing contracts align with live data repositories and API application access, whether by a user, third-party app, or system</li><li>Automate privacy and security checks on data at-rest, and in-motion when used in a business transaction</li><li>Demonstrate the assurance of safe PII data, and access and authorization policies related to personal information for compliance</li></ul><p>A webcast on <em>How to Solve CCPA and GDPR’s Toughest Compliance Mandates</em> is on November 20, 2019. Register here: <a href="https://integris.io/cloudentity-webinar/">https://integris.io/cloudentity-webinar/</a></p><p>Key takeaways for data, privacy and information systems professionals will include:</p><ul><li>How to solve CCPA and GDPRs toughest compliance issues (inferred data, right to deletion, right to opt-out, and disclosure obligations) within complex IT environments</li><li>Key challenges and best practices on how to create, monitor, and enforce API contracts</li><li>Why data privacy and fulfilling data subject requests is now a big data problem and how to solve it (4 recommendations plus the one thing you should never do)</li><li>How to support the new realities of ‘continuous consent’ and the evolving nature of personal information privacy</li></ul><p>In addition to its new partnership with Cloudentity to integrate privacy and security solutions, Integris Software also recently announced the <a href="https://integris.io/integris-software-launches-partner-program/">Integris Partner Program</a> to bring together key industry organizations to help enterprises automate and improve their data privacy practices. Cloudentity has now joined the program to align with other leading security, privacy and identity verification technologies to support global businesses.</p><p><strong>About Cloudentity<br> </strong><a href="https://cloudentity.com">Cloudentity</a> is a privacy-first Customer Identity and Access Management platform. We secure, identify, and authorize: users, services and things that need access to personal identifiable data. We keep out those who should not have access We do this with powerful, cloud-native identity and access control microservices that integrate quickly, seamlessly, and efficiently into an organization’s existing hybrid, or cloud architecture. We provide in-depth: visibility, protection and policy enforcement at the API level.</p><p>Follow Cloudentity at <a href="http://www.cloudentity.com">www.cloudentity.com</a>, <a href="https://www.linkedin.com/company/cloudentityteam/">https://www.linkedin.com/company/cloudentityteam/</a></p><p><strong>About Integris Software<br> </strong><a href="https://integris.io/">Integris Software,</a> the global leader in data privacy automation, helps enterprises discover and control the use of sensitive data in a way that protects privacy and fuels innovation.</p><p>Privacy is now critical to an effective data protection strategy. By sitting upstream from security, Integris tells you what data is important and why so you can be precise in your InfoSec controls.</p><p>Integris works securely, at scale, no matter where sensitive data resides. You get a live map of your sensitive data where you can apply policies, surface issues, fulfill <a href="https://integris.io/dsar">DSAR</a> requests, and automate remediations via your broader ticketing and InfoSec ecosystem.</p><p>Regulations like <a href="https://integris.io/gdpr/">GDPR</a> and the <a href="https://integris.io/five-things-to-do-prepare-ccpa/">California Consumer Privacy Act (CCPA)</a> are triggering knee-jerk reactions as companies lock down their data for fear of misuse. With Integris, there is finally a way to use your data without fear.</p><p>For more information on Integris, visit: <a href="http://www.integris.io/">www.integris.io</a> or follow <a href="https://twitter.com/integrisio">@Integrisio</a> on Twitter.</p><p>###</p><p><strong>Media Contacts:<br> </strong>RH Strategic for Integris Software<br> (206) 264–2400<br> <a href="mailto:IntegrisPR@rhstrategic.com">IntegrisPR@rhstrategic.com</a></p><p>Amie Johnson for Cloudentity<br> (206) 299–1112<br> <a href="mailto:IntegrisPR@rhstrategic.com">press@cloudentity.com</a></p><p><em>Originally published at </em><a href="https://cloudentity.com/press-release-integris-software-partners-with-cloudentity/"><em>https://cloudentity.com</em></a><em> on October 31, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=a910f6a764f0" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/press-release-integris-software-partners-with-cloudentity-to-launch-industry-first-automated-data-a910f6a764f0">Press Release: Integris Software Partners with Cloudentity to Launch Industry-First Automated Data…</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
        <item>
            <title><![CDATA[Where AuthN becomes AuthZ]]></title>
            <link>https://medium.com/cloudentity/where-authn-becomes-authz-570cd5db96ac?source=rss-b77c1f7be885------2</link>
            <guid isPermaLink="false">https://medium.com/p/570cd5db96ac</guid>
            <category><![CDATA[authentication]]></category>
            <category><![CDATA[api]]></category>
            <category><![CDATA[authorization]]></category>
            <dc:creator><![CDATA[Cloudentity]]></dc:creator>
            <pubDate>Mon, 28 Oct 2019 23:10:02 GMT</pubDate>
            <atom:updated>2020-03-25T22:13:27.850Z</atom:updated>
            <content:encoded><![CDATA[<p>Cloudentity provides a robust set of tools to manage Identity and API security, or the complete chain from Authentication with our CIAM platform and Authorization with our API security enforcement gateways, sidecars and other tools.</p><p>But even when we think of Authentication as Identity and Authorization as Enforcement, there’s still confusion about where AuthN leaves off and AuthZ begins. Let’s take a quick review.</p><p><strong>Authentication</strong> is not security in itself — it allows a person or thing to prove they are who they say they are, and then returns details about that entity. Those details might include Personally Identifiable Information (PII), or it might be abstracted with a unique user ID (UUID).</p><p>Tools for authentication might be a username and password, a “magic code” in the form of a one-time token in a passwordless flow, biometric data like fingerprints or combinations of identifiers. But all of these mechanisms do not secure your application, they simply corroborate the identity of the entity in question.</p><p><strong>Authorization</strong> is the actual act of enforcement. We’ve gone through our login and MFA process, and now we have some details that the application can use to grant or deny access to different kinds of data. It might limit access to an individual’s records based on roles or attributes assigned to one’s identity, it might look at scopes and give access to more detailed reports, or not. It’s up to the business logic and the enforcement in Authorization to apply those details to enforce access rules.</p><p>You can think of Authentication as the key and Authorization as the lock.</p><p>Only here’s the problem — there are lot of applications out there with lots of different locks. Some of them are custom code, some of them are gateways at the edge of the network using access tokens, some of them are server-side tools that enforce rules based on the original SAML response… And each one of those has a set of rules that are applied in different ways by different people with different monitoring and audit tools.</p><p>In practice, Authentication is often less of a key and more of a suggestion while Authorization is less of a lock and more of a latchkey — you might be able to open it with a pocketknife, and even if anyone looks at your credentials, they might just glance and wave you through.</p><p>Modern application security requires a combination of tools that work together; we can’t look at AuthN and AuthZ as two separate things, and we can no longer support the idea that applications can be trusted to secure themselves.</p><p>A <a href="https://cloudentity.com/identity-management/">Consumer Identity Access Management</a> system allows individuals to identify themselves. It should support multiple factors to make sure the individual is who they say they are, and it should allow administrators, workflows and other authorized tools to provide increasing details about that individual for granular access control.</p><p><a href="https://cloudentity.com/microperimeter-api-security/">API and Application Security</a> should be platform independent allowing the same basic set of tools to be used to secure legacy systems, cloud-hybrid, cloud native, and multi-cloud architectures. In other words, no matter where it’s deployed, it’s secured.</p><p>But Identity and Authorization need to be tied together with secure policy management. Polices define how that AuthN key fits into that AuthZ lock — that is, policies are aware of all of the data that describes the individual and how that data is applied to security enforcement.</p><p>Once you tie your Identity Access Management to your API and Application Authorization you start to have a complete ecosystem — now with everything can be logged because everything is tied together, and if it’s logged it can be visualized.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/514/0*9pNxbJRj7Y62AQVd.png" /></figure><p>Policies should be able to be defined and refined as part of the application development process. Libraries of known policies should be able to be created and shared so developers don’t have to reinvent the wheel.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/1024/0*ieOqp6st46upFnzP.png" /></figure><p>At the end of the day security is something we are all responsible for. The fact we, as an industry, do it so piecemeal, slows us down — trying to explain the security to a compliance officer when your security is wrapped up in code is like speaking Japanese to someone from Finland. We need common language, consistent identity, and clear documentation about how identity is applied to individual services and applications.</p><p>It shouldn’t be complicated but unravelling your current security and modernizing it might take a little finessing — feel free to <a href="https://cloudentity.com/contact/">contact us</a> to learn how Cloudentity can help tie together your AuthN Identity and AuthZ security in a seamless way.</p><p><em>Originally published at </em><a href="https://cloudentity.com/where-authn-becomes-authz/"><em>https://cloudentity.com</em></a><em> on October 28, 2019.</em></p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=570cd5db96ac" width="1" height="1" alt=""><hr><p><a href="https://medium.com/cloudentity/where-authn-becomes-authz-570cd5db96ac">Where AuthN becomes AuthZ</a> was originally published in <a href="https://medium.com/cloudentity">Cloudentity</a> on Medium, where people are continuing the conversation by highlighting and responding to this story.</p>]]></content:encoded>
        </item>
    </channel>
</rss>