Unveiling the Power of IAM: Enhancing Security and Efficiency in Modern Enterprises


Authors : Rajesh Kumar

Volume/Issue : Volume 9 - 2024, Issue 6 - June

Google Scholar : https://tinyurl.com/mvfpw3m3

Scribd : https://tinyurl.com/mrdz9tjh

DOI : https://doi.org/10.38124/ijisrt/IJISRT24JUN731

Abstract : The power of IAM is to play a pivotal part in guaranteeing the security and integrity of digital frameworks and data (Mohammed, 2017). As associations progressively depend on advanced innovations and cloud- based administrations, the requirement for successful IAM arrangements becomes fundamental (Mohammed, 2017). This paper investigates the basics, advances, best practices, and difficulties of IAM in network safety. It digs into key ideas, for example, authentication, authorization, identity lifecycle management, and access control. Through investigation of true contextual analyses, this paper exhibits fruitful IAM executions and their advantages, alongside the difficulties faced by associations. By getting it and carrying out IAM best practices, associations can upgrade their security posture, protect delicate data, and relieve the risk of unapproved access. This paper is meant to give a thorough comprehension of IAM standards, innovations, and patterns, and to feature its basic job in protecting computerized conditions in the present network safety scene.

Keywords : Identity and Access Management (IAM), Security and Integrity, Authentication, Authorization, Identity Lifecycle Management, Access Control Components.

References :

  1. Mohammed, I. A. (2017). Systematic review of identity access management in information security. International Journal of Innovations in Engineering Research and Technology4(7), 1-7.
  2. Mohammed, I. A. (2013). Intelligent authentication for identity and access management: a review paper. International Journal of Management, IT and Engineering (IJMIE)3(1), 696-705.
  3. Sturrus, E., & Kulikova, O. (2016). Identity and Access Management. Encyclopedia of Cloud Computing, 396-405.
  4. Indu, I., Anand, P. R., & Bhaskar, V. (2018). Identity and access management in cloud environment: Mechanisms and challenges. Engineering science and technology, an international journal21(4), 574-588.
  5. Mungfali.com. (1970, January 1). Identity and Access Management Process. “https://mungfali.com/post/0BA6D5EF7559B2B2D7E84709D85EA55431E0C1D2/Identity+and+Access+Management+Process”.
  6. Singh, Chetan pal, Rahul Thakkar, and Jatinder Warraich. "IAM identity Access Management—importance in maintaining security systems within organizations." European Journal of Engineering and Technology Research 8.4 (2023): 30-38.
  7. Joshi, U., Cha, S., & Esmaili-Sardari, S. (2018). Towards adoption of authentication and authorization in identity management and single sign on. Advances in Science, Technology and Engineering Systems3(5), 492-500.
  8. Muddychetty, N. S. (2024). A Comparative Analysis of Security Services Using Identity and Access Management (IAM).
  9. Kuokkanen, A. (2020). Newcomer's introduction to Privileged Access Management.
  10. Yubico, 451 Research (2021) Work-from-home policies driving MFA adoption, but still work to be done.
  11. Parveen, S., Sultan, A., & Khan, M. A. (2021). Integration of Identity Governance and Management Framework within Universities for Privileged Users. International Journal of Advanced Computer Science and Applications12(6).
  12. Anand, Niharika. "Role of IAM in an Organization." (2021).
  13. M. Small, "Business and technical motivation for identity management", Information Security Technical Report, vol. 9, no. 1, pp. 6-21, 2004. 18)
  14. J. Smith, "Getting the Right Balance: Information Security and Information Access", Legal Information Management, vol. 10, no. 1, pp. 51-54, (2010).
  15. M. Uddin and D. Preston, "Systematic Review of Identity Access Management in Information Security", Journal of Advances in Computer Networks, vol. 3, no. 2, pp. 150-156, (2015).

The power of IAM is to play a pivotal part in guaranteeing the security and integrity of digital frameworks and data (Mohammed, 2017). As associations progressively depend on advanced innovations and cloud- based administrations, the requirement for successful IAM arrangements becomes fundamental (Mohammed, 2017). This paper investigates the basics, advances, best practices, and difficulties of IAM in network safety. It digs into key ideas, for example, authentication, authorization, identity lifecycle management, and access control. Through investigation of true contextual analyses, this paper exhibits fruitful IAM executions and their advantages, alongside the difficulties faced by associations. By getting it and carrying out IAM best practices, associations can upgrade their security posture, protect delicate data, and relieve the risk of unapproved access. This paper is meant to give a thorough comprehension of IAM standards, innovations, and patterns, and to feature its basic job in protecting computerized conditions in the present network safety scene.

Keywords : Identity and Access Management (IAM), Security and Integrity, Authentication, Authorization, Identity Lifecycle Management, Access Control Components.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe