Cloud Security: Identity and Endpoint
protection
(Application on Microsoft Azure)
Over the past ten years, cloud computing has been integrated into a
wide range of industries.Cloud service providers manage remote data
centers that are accessible via the internet, replacing on-site infrastructure
in the personal and enterprise computing models. However,
both individuals and businesses now have security concerns as a result
of this paradigm shift in computing. It is necessary to carefully
consider and resolve these security issues in order to increase cloud
deployment. This research addresses a number of important topics,
including cloud models, threats and mitigation, vulnerabilities, and
cloud security issues and concerns. The findings show that organizations
can deflect certain types of attacks and threats with the right
policies and settings, and that the security posture can be improved
with relatively minor changes. This is demonstrated in this study
through the use of Intune and the creation of policies to protect the
organization. After the research is completed, we will have a better
understanding of cloud computing concepts, with a focus on end point
and identity protection in Microsoft Azure, and we will be able to design
new policies and controls to better safeguard our IOT in cloud
computing.