Cloud Security: Enterprise individuals should use multiple identity authentication

Source: Internet
Author: User
Keywords Should be cloud security

At the Cloud Computing Security Symposium, three senior security experts-Hewlett-Packard senior security strategist Rafal Los,qualys Chief Technical officer Wolfgang Kandek and Cloudpassage Chief Security advisor Andrew Hay, Agreed that at this stage any kind of networking equipment and network accounts are likely to be hacked, the best security precaution is to enable multiple identity authentication immediately.

Three experts referred to the case of hit, a wired magazine journalist, Honan, Honan's encounter exposed a serious security breach in public cloud services such as Amazon Cloud, Apple icloud, etc. The hackers first obtained Honan's Apple account through Amazon Cloud service, successfully entered the Gmail account and obtained the Twitter account from it. If Honan uses Gmail's dual authentication, hackers will not succeed-breaking Twitter accounts and publishing illegal information.

The most common application of multiple identity authentication is the dual authentication of Google accounts, and if you have a Google account, you can install Google Authenticator identity (Android, iOS, and BlackBerry devices) on your phone. Each time you need to enter a Google account password, you must also enter the identity of the mobile phone authentication generated by the dynamic password. This approach maximizes the security of the account and the information and assets associated with the account.

Cloudpassage's chief Security advisor, Hay, said:

At present, all passwords are no longer secure (editor's note: Even if your password is very strong, but jiabuzhu the major sites at home and abroad Gesanchaiwu leak user data). Only multiple authentication is the only feasible mainstream security technology at this stage.

Qualys's Kandek further points out that all Web sites and services should enable multiple authentication.

Should multiple authentication start with the enterprise or individual user?

Hewlett-Packard and Qualys experts agree that multiple identities should start with corporate users, mainly because companies can force employees to enforce new security policies. And consumers are afraid of trouble, it is hard to say, no matter how serious the problem, the new method how good, are no use.

But Cloudpassage does not agree with the top two, who believes that consumers should be taught to use multiple identity authentication tools, because consumers are more vulnerable to cyber security than employees in companies.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.