This really doesn’t make me love cloud identity management. It’s exactly the scenario (kind of nightmare one) where you attack the cloud infrastructure and get access to many different customers and apps… potentially in a way completely undetectable by you. At least with local identity providers they have to compromise you, and you might have logs.
You must log in or register to comment.