Blogginlägg -

Securing your identities for cloud applications like Microsoft Office 365

Using cloud applications is very common today. Each user tend to use several different cloud services and applications every day in working life. To work efficiently and secure you should define you own cloud strategy for your organization.

There are lots of things to consider regarding security when you define your cloud strategy. How secure is the cloud application? How secure is your data in the cloud application? Who has the right to the data? Can you move to another cloud application and transfer your data? And lots of more…

When using Microsoft Office 365 you need to consider how you secure your identities. StrongAuthentication/2FA, is a obvious selection. You want to avoid managing and storing passwords or password hashes in the cloud. Your identities should be able to be used in other cloud applications than Office 365. You don’t want to maintain several identities for each user and cloud service. Besides your users want it to be easy to logon and they don’t want to remember different credentials for each application. In the best case your users want it to be secure as well, but certainly you want your organizations data to be protected. Use strongauthentication for your cloud applications. Your cloud strategy should contain a solution for Cloud SSO. Then your users can use one single identity for any cloud application.

/ Stefan Sundh, Solution Architect

Ämnen

  • Datasäkerhet

Kategorier

  • esign
  • security
  • blog

Regioner

  • Dalarna

Kontakter

Relaterat innehåll

  • Ale kommun stärker säkerhet för anställda

    Ale kommun har upphandlat en lösning för tillverkning och administration av tjänstekort som gäller för alla anställda. Kommunledningen ställde krav på att alla anställda skall ha en säker identifikation som också kan användas för säker inloggning samt för passage, print-on-demand etc.

  • neXus stärker i Mellanöstern

    neXus har ingått ett distributionsavtal med Shifra, en distributör i Dubai, vilket gör det möjligt för Shifra att sälja neXus PKI-plattformar i Mellanösternregionen.

  • Carolen Ytander ny CMO för neXus

    neXus stärker sin företagsledning ytterligare och rekryterar Carolen Ytander som ansvarig för marknad, kommunikation och strategisk HR. Carolen kommer närmast från Vattenfall där hon haft flera olika chefsroller, däribland som nordisk marknadschef.

  • neXus stärker satsning på Norden – rekryterar Marcus Persson från Atea

    neXus stärker nu ytterligare sin satsning på den nordiska marknaden och rekryterar Marcus Persson som ny regionchef för företaget i Norden. Marcus kommer närmast från Atea där han haft flera olika chefsroller och senast varit ansvarig för Ateas affärsavtal i Sverige.

  • neXus med på världslista över snygga kontor

    Det svenska säkerhetsföretaget neXus sitter sedan två år tillbaka i Ericssons gamla lokaler vid Telefonplan söder om Stockholm. Lokalerna som inretts av MER arkitektbyrå, har nu utsetts till en av världens 35 mest spännande arbetsplatser.

  • The SCIM standards just grew up to become RFC's

    Integrity and simplicity for both users and IT-departments just took a huge step forward on the Internet. The SCIM specifications, System for Cross-Domain Identity Management, are now published as publications by the Internet Engineering Taskforce (IETF) as RFC7643 and RFC7644. At neXus we are super proud because we have been playing a key part of the specifications.

  • The Hacked Jeep is not alone

    As I wrote about in the blog post “Demystifying Security and Identities for Internet of Things” it is essential to implement security by design.

  • The IETF #93 meeting is wrapping up and it was a great week

    An very intensive Internet Engineering Task Force (IETF) week in Prague is just winding down. It’s been a great week in warm and welcoming Prague. IETF works on the specifications that together form the Internet and IETF attendees meets three times a year to try to make the internet, slowly but consistently, a better place.

  • WebCrypto, Invisible Token and Hybrid Access Gateway

    After following the development of WebCrypto for more then three years it is awesome to see how it now slowly becomes implemented by the larger browsers. You can test your browser here.

  • Explosion in IoT reveals risk of massive black market

    In a recent report Gartner predicts that by 2020 over 50% of new major business process and system will incorporate some element of the Internet of Things. From a security perspective this growth will be challenge from many perspectives.

  • Identity data capture and validation is key

    This week I had the pleasure of visiting NORSIS event IDentitet 2016 in Oslo. Very well structured the event started with presentations around the capturing and validation of identity data which is fundamental for the trust in eIDs (and of course other types of credentials).

  • Happy Data Privacy Day!

    January 28th is the Data Privacy Day, a date that is currently observed in United States, Canada and 47 European countries.