ChaptersCircleEventsBlog
Join us for the in-person CCSK Azure course at Black Hat from August 4–5! Register now for a hands-on deep dive and secure your spot now!

Download Publication

SecaaS Category 1 // Identity and Access Management Implementation Guidance
SecaaS Category 1 // Identity and Access Management Implementation Guidance

SecaaS Category 1 // Identity and Access Management Implementation Guidance

Release Date: 09/26/2012

Working Group: Security as a Service

This document addresses personnel involved in the identification and implementation of the IAM solution in the cloud. It will be of particular interest to those with the responsibility of designing, implementing and integrating the consumption of services of the IAM function within any cloud application of SecaaS.
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Shadow Access and AI
Shadow Access and AI
Identity and Access Management Working Group Charter 2024
Identity and Access Management Working Group Ch...
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
Why Do Organizations Migrate to the Public Cloud? Hint: It Isn’t About Cost Anymore
Why Do Organizations Migrate to the Public Cloud? Hint: It Isn’t Ab...
Published: 06/26/2025
What Kind of Identity Should Your AI Agent Have?
What Kind of Identity Should Your AI Agent Have?
Published: 06/25/2025
CIEM and Secure Cloud Access Best Practices
CIEM and Secure Cloud Access Best Practices
Published: 06/24/2025
Protecting the Weakest Link: Why Human Risk Mitigation is at the Core of Email Security
Protecting the Weakest Link: Why Human Risk Mitigation is at the Co...
Published: 06/20/2025

Acknowledgements

Luciano (J.R.) Santos
Luciano (J.R.) Santos
Chief Customer Officer, CSA

Luciano (J.R.) Santos

Chief Customer Officer, CSA

J.R. Santos serves as the Chief Customer Officer for the Cloud Security Alliance. In this role, J.R. serves as a CSA Member advocate, partnering with leaders across all business units to transform the member experience and ensure that members are the center of every business decision. J.R. leads the Experience Services organization that includes the CSA Membership and Sales team, who work collaboratively to promote a consistent experience f...

Read more

Aaron Alva Headshot Missing
Aaron Alva

Aaron Alva

Said Tabet Headshot Missing
Said Tabet

Said Tabet

Balaji Ramamoorthy Headshot Missing
Balaji Ramamoorthy

Balaji Ramamoorthy

Tim Brooks Headshot Missing
Tim Brooks

Tim Brooks

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Jim Brigham Headshot Missing
Jim Brigham

Jim Brigham

Ulrich Lang Headshot Missing
Ulrich Lang

Ulrich Lang

Kanchanna Balraj Headshot Missing
Kanchanna Balraj

Kanchanna Balraj

Kendall Scoboria Headshot Missing
Kendall Scoboria

Kendall Scoboria

Anish Mohammed Headshot Missing
Anish Mohammed

Anish Mohammed

Martin Antony Headshot Missing
Martin Antony

Martin Antony

Evan Scoboria Headshot Missing
Evan Scoboria
Technology Director, CSA

Evan Scoboria

Technology Director, CSA

Robert Polansky Headshot Missing
Robert Polansky

Robert Polansky

Sameer Anja Headshot Missing
Sameer Anja

Sameer Anja

Sundar Narayanswamy Headshot Missing
Sundar Narayanswamy

Sundar Narayanswamy

Kent Welch Headshot Missing
Kent Welch

Kent Welch

John Yeoh
John Yeoh
Global Vice President of Research, CSA

John Yeoh

Global Vice President of Research, CSA

With over 15 years of experience in research and technology, John excels at executive-level leadership, relationship management, and strategy development. He is a published author, technologist, and researcher with areas of expertise in cybersecurity, cloud computing, information security, and next generation technology (IoT, Big Data, SecaaS, Quantum). John specializes in risk management, third party assessment, GRC, data protection, incid...

Read more

Vicki Hahn Headshot Missing
Vicki Hahn

Vicki Hahn

Jean Pawluk Headshot Missing
Jean Pawluk

Jean Pawluk

John Linn Headshot Missing
John Linn

John Linn

Karen Lu HongQian Headshot Missing
Karen Lu HongQian

Karen Lu HongQian

Laura Robinson Headshot Missing
Laura Robinson

Laura Robinson

Sandeep Mittal Headshot Missing
Sandeep Mittal

Sandeep Mittal

Andrey Dulkin Headshot Missing
Andrey Dulkin

Andrey Dulkin

Valmiki Mukherjee Headshot Missing
Valmiki Mukherjee

Valmiki Mukherjee

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training