This is a decommissioned version of ERA which is running to enable completion of migration processes. All new collections and items and all edits to existing items should go to our new ERA instance at https://ualberta.scholaris.ca - Please contact us at erahelp@ualberta.ca for assistance!
- 814 views
- 1363 downloads
Robust identity and access management for cloud systems
-
- Author(s) / Creator(s)
-
With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A robust IAM system acts as a security boundary that controls authentication, authorization and access control for identities and devices both within and outside the organization. This paper explains the requirements of cloud IAM systems and various attacks on them due to weak security controls. The comparative analysis of the technologies and requirements endows an IAM framework aimed at a more integrated approach to secure identities and IAM systems. The framework is achieved by creating a robust algorithm for enhanced assurance levels for identity verification, proofing and continuous monitoring of all cloud identities and activities.
-
- Date created
- 2020
-
- Subjects / Keywords
-
- Type of Item
- Research Material