Identity access management
The data center in a typical organization is shielded with various security provisions. The applications, hosts, network systems, and all other data center equipment is guarded by tight security protocols and practices. The IT department has full control over the access to the infrastructure as well as the applications. External access to the organization's network is secured by providing VPN connectivity. There are also provisions for intrusion detection and intrusion prevention.
When an organization decides to adapt the hybrid cloud model, the IT department's control over the infrastructure either reduces or extends into the cloud provider's domain. This reduction of control over the IT infrastructure and applications is a challenge for organizations, as security becomes a major concern.
Thus, to reduce the security risk and compensate for the reduction of control, organizations must adapt to a higher level of application security and user access control mechanism...