Announcements
This ISC2 Community will be decommissioned as of May 29, 2026. Please join your peers and connect with your chapter at https://isc2chapters.isc2.org.
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
CY
Newcomer II

Threat modelling and securing AaaS (Authentication as a service)

Hi 

I wonder if anyone has come across any articles or blogs on threat modelling and securing Authentication as a Service? There are quite a number of AaaS available on AWS and I am trying to figure out some guidelines are criteria to chose and secure the use of AaaS on our applications.  Thanks

1 Reply
Caute_cautim
Community Champion

@CY   The nearest I found was a research paper:

 

Sounds like an opportunity for the Cloud Security Alliance (CSA)?

 

Regards

 

Caute_cautim