Authors :
Rajesh Kumar
Volume/Issue :
Volume 9 - 2024, Issue 6 - June
Google Scholar :
https://tinyurl.com/mvfpw3m3
Scribd :
https://tinyurl.com/mrdz9tjh
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24JUN731
Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.
Abstract :
The power of IAM is to play a pivotal part in
guaranteeing the security and integrity of digital
frameworks and data (Mohammed, 2017). As associations
progressively depend on advanced innovations and cloud-
based administrations, the requirement for successful IAM
arrangements becomes fundamental (Mohammed, 2017).
This paper investigates the basics, advances, best practices,
and difficulties of IAM in network safety. It digs into key
ideas, for example, authentication, authorization, identity
lifecycle management, and access control. Through
investigation of true contextual analyses, this paper exhibits
fruitful IAM executions and their advantages, alongside the
difficulties faced by associations. By getting it and carrying
out IAM best practices, associations can upgrade their
security posture, protect delicate data, and relieve the risk
of unapproved access. This paper is meant to give a
thorough comprehension of IAM standards, innovations,
and patterns, and to feature its basic job in protecting
computerized conditions in the present network safety
scene.
Keywords :
Identity and Access Management (IAM), Security and Integrity, Authentication, Authorization, Identity Lifecycle Management, Access Control Components.
References :
- Mohammed, I. A. (2017). Systematic review of identity access management in information security. International Journal of Innovations in Engineering Research and Technology, 4(7), 1-7.
- Mohammed, I. A. (2013). Intelligent authentication for identity and access management: a review paper. International Journal of Management, IT and Engineering (IJMIE), 3(1), 696-705.
- Sturrus, E., & Kulikova, O. (2016). Identity and Access Management. Encyclopedia of Cloud Computing, 396-405.
- Indu, I., Anand, P. R., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering science and technology, an international journal, 21(4), 574-588.
- Mungfali.com. (1970, January 1). Identity and Access Management Process. “https://mungfali.com/post/0BA6D5EF7559B2B2D7E84709D85EA55431E0C1D2/Identity+and+Access+Management+Process”.
- Singh, Chetan pal, Rahul Thakkar, and Jatinder Warraich. "IAM identity Access Management—importance in maintaining security systems within organizations." European Journal of Engineering and Technology Research 8.4 (2023): 30-38.
- Joshi, U., Cha, S., & Esmaili-Sardari, S. (2018). Towards adoption of authentication and authorization in identity management and single sign on. Advances in Science, Technology and Engineering Systems, 3(5), 492-500.
- Muddychetty, N. S. (2024). A Comparative Analysis of Security Services Using Identity and Access Management (IAM).
- Kuokkanen, A. (2020). Newcomer's introduction to Privileged Access Management.
- Yubico, 451 Research (2021) Work-from-home policies driving MFA adoption, but still work to be done.
- Parveen, S., Sultan, A., & Khan, M. A. (2021). Integration of Identity Governance and Management Framework within Universities for Privileged Users. International Journal of Advanced Computer Science and Applications, 12(6).
- Anand, Niharika. "Role of IAM in an Organization." (2021).
- M. Small, "Business and technical motivation for identity management", Information Security Technical Report, vol. 9, no. 1, pp. 6-21, 2004. 18)
- J. Smith, "Getting the Right Balance: Information Security and Information Access", Legal Information Management, vol. 10, no. 1, pp. 51-54, (2010).
- M. Uddin and D. Preston, "Systematic Review of Identity Access Management in Information Security", Journal of Advances in Computer Networks, vol. 3, no. 2, pp. 150-156, (2015).
The power of IAM is to play a pivotal part in
guaranteeing the security and integrity of digital
frameworks and data (Mohammed, 2017). As associations
progressively depend on advanced innovations and cloud-
based administrations, the requirement for successful IAM
arrangements becomes fundamental (Mohammed, 2017).
This paper investigates the basics, advances, best practices,
and difficulties of IAM in network safety. It digs into key
ideas, for example, authentication, authorization, identity
lifecycle management, and access control. Through
investigation of true contextual analyses, this paper exhibits
fruitful IAM executions and their advantages, alongside the
difficulties faced by associations. By getting it and carrying
out IAM best practices, associations can upgrade their
security posture, protect delicate data, and relieve the risk
of unapproved access. This paper is meant to give a
thorough comprehension of IAM standards, innovations,
and patterns, and to feature its basic job in protecting
computerized conditions in the present network safety
scene.
Keywords :
Identity and Access Management (IAM), Security and Integrity, Authentication, Authorization, Identity Lifecycle Management, Access Control Components.