ERA is in the process of being migrated to Scholaris, a Canadian shared institutional repository service (https://scholaris.ca). Deposits to existing ERA collections are frozen until migration is complete. Please contact erahelp@ualberta.ca for further assistance
- 799 views
- 1332 downloads
Robust identity and access management for cloud systems
-
- Author(s) / Creator(s)
-
With increased financial loss and massive data breaches in the cloud-based environments, it is imperative for organizations to invest in new Identity and Access Management(IAM) solutions that are usable and are conforming to all the security requirements needed to protect cloud identities. A robust IAM system acts as a security boundary that controls authentication, authorization and access control for identities and devices both within and outside the organization. This paper explains the requirements of cloud IAM systems and various attacks on them due to weak security controls. The comparative analysis of the technologies and requirements endows an IAM framework aimed at a more integrated approach to secure identities and IAM systems. The framework is achieved by creating a robust algorithm for enhanced assurance levels for identity verification, proofing and continuous monitoring of all cloud identities and activities.
-
- Date created
- 2020
-
- Subjects / Keywords
-
- Type of Item
- Research Material