CLOUD IDENTITY AND ACCESS MANAGEMENT – A MODEL PROPOSAL
Keywords:
Identity, access management, Cloud identityAbstract
This paper discusses the application of cloud identity and access management in digital transformation and cloud adoption. Cloud computing refers to a fusion of various technologies, including grid computing and distributed computing, that makes use of the Internet as a service delivery network [1]. Organizations need the ability to choose the services and pricing models that best meet their needs, and budgetary constraints. It is the cloud service providers that set the price model for their cloud services, considering factors like instance size, utilization size (per hour), users’ size (per user), infrastructure size (per hour), and service size (per service). The majority of businesses are hosting or implementing web services in a cloud infrastructure for the convenience of administration and increased availability [1]. Multi-tenant setups are also utilized in cloud-based services to reduce the cost considerations associated with the services. To accomplish multi-tenancy in the cloud, virtual environments are utilized. A vulnerability in virtual machines poses a direct danger to the privacy and security of the people who are using them [2]. Security problems in cloud web services are found in particular areas such as authentication, authorization, data protection, and accountability, among other things. Cloud security is critical to business and technology sustainability. Even though the "trust boundary" is largely static and monitored and managed by the IT unit in a centralized company where functionality is being implemented within the perimeter of the company, the trust limit becomes dynamic and moves beyond IT command with the adoption of cloud computing [3]. A company's servers, systems, and applications boundaries will expand into the service provider domains. In addition, this loss of control poses a threat to the existing trusted governance and management paradigm, and it has the potential to impede the adoption of cloud services inside an organization if it is not handled correctly. Modern organizations understand the significance of protecting identities in the era of remote work and cloud hosting inside the zero boundaries, Zero Trust. However, as the quantity, kinds, and interrelationships of identities continue to grow exponentially across cloud settings, it is clear that this is a far easier said than done task [3]. Cloud security is widely acknowledged to be a shared duty between cloud service providers and their customers, at least in theory. In the process of determining the best Identity and Access Management (IAM) policies for these settings, many companies are confronted with issues such as: When are cloud-native technologies adequate, and when should we explore specialist solutions from other vendors? With all of the IT security jargon flying about, it may be difficult to discern the difference.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License (CC BY-NC-ND 4.0 DEED).
You are free to:
- Share — copy and redistribute the material in any medium or format
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- NonCommercial — You may not use the material for commercial purposes .
- NoDerivatives — If you remix, transform, or build upon the material, you may not distribute the modified material.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.
Rights of Authors
Authors retain the following rights:
1. Copyright and other proprietary rights relating to the article, such as patent rights,
2. the right to use the substance of the article in future works, including lectures and books,
3. the right to reproduce the article for own purposes, provided the copies are not offered for sale,
4. the right to self-archive the article.