The public cloud eliminated traditional network boundaries, so cloud security is based on different strategies, like entitlement management
"The security boundary of your cloud is your Identities,"
writes Eric Kedrosky in
"both people users and non-people identities, and they need to be managed accordingly. There can be tens of thousands of non-people identities in your cloud environment, and it is the use cases of these non-people identities make security even more complex.
Identity-based use cases are proliferating dramatically, which brings into question their entitlements. In the cloud, we call these entitlements an Identity's Effective Permissions, the end-to-end permission of the actions that an Identity can take and the data it can access..."
Read More ...