John
Reports
John
21.08.2023
41% of Enterprises Can Enforce Consistent Access Policies
41% of Enterprises Can Enforce Consistent Access Policies

Image: Sigmund (unsplash)

In a recent analysis conducted by Strata Identity, the landscape of identity management in multi-cloud environments was delved into. The study unveiled that there has been a decrease in organizations using a single cloud identity provider (IDP) – from 30% to 20% in just one year. This indicates that the vast majority, which is 80%, now deploy multiple IDPs to handle enterprise identity.

Due to such a dispersion, three primary cloud security challenges have emerged for enterprises. These are the lack of transparency in access policies (67%), identity-related threats (65%), and challenges in adhering to data privacy norms (56%).

A staggering 76% of organizations are left without a full view into the access guidelines and applications spanning several cloud platforms. This comprises a lack of knowledge about the existing access policies, the location of application deployments, and the specifics on who has or hasn’t been granted access.

It’s noteworthy that over half of the enterprises, accounting for 56%, don’t possess a unified perspective of identities and their relevant characteristics. Additionally, a mere 41% of the firms partook in the survey conveyed their capability to implement uniform access policies to mitigate identity and security hazards. This reflects a reduction from 55% in the preceding year, marking a substantial 25% dip on a year-to-year basis.

Furthermore, many organizations are constrained by outdated infrastructures. Sixty percent lack either the resources or the duration to update antiquated applications to be in line with contemporary identity protocols and to integrate with cloud identity frameworks boasting advanced security features, such as passwordless authentication. An even higher number, at 78%, don’t possess the essential source code required to modify their applications for compatibility with today’s identity systems.

The complete analysis is accessible in the full report.