Robust identity and access management for cloud systems

  • Author(s) / Creator(s)
  • With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A robust IAM system acts as a security boundary that controls authentication, authorization and access control for identities and devices both within and outside the organization. This paper explains the requirements of cloud IAM systems and various attacks on them due to weak security controls. The comparative analysis of the technologies and requirements endows an IAM framework aimed at a more integrated approach to secure identities and IAM systems. The framework is achieved by creating a robust algorithm for enhanced assurance levels for identity verification, proofing and continuous monitoring of all cloud identities and activities.

  • Date created
    2020
  • Subjects / Keywords
  • Type of Item
    Research Material
  • DOI
    https://doi.org/10.7939/r3-ztwg-xm63
  • License
    Attribution-NonCommercial 4.0 International