ESP Journal of Engineering & Technology Advancements |
© 2023 by ESP JETA |
Volume 3 Issue 2 |
Year of Publication : 2023 |
Authors : Hariprasad Sivaraman |
:10.56472/25832646/JETA-V3I6P108 |
Hariprasad Sivaraman, 2023. "Zero Trust Identity and Access Management (IAM) in Multi-Cloud Environments ESP Journal of Engineering & Technology Advancements" 3(2): 135-139.
With multi-cloud strategies being adopted globally, managing identity and access across cloud platforms is a problem that can longer be ignored. The single environment Identity and Access Management (IAM) solutions can hardly enforce the same policy (consistency) and the inter-cloud/gen interoperability between clouds or agility in complex threats landscapes, and are non-multi cloud (non-support). This research paper presents a Zero Trust IAM model designed for multi-cloud ecosystems, with identity verification, unified governance, continuous authentication in Watchful Security Zones (WSZs), and micro-segmentation to break identities up into separate segments that can be isolated. It establishes a unified identity layer between cloud providers for security, compliance and ease of operation.
[1] J. Kindervag, "Build Security into Your Network’s DNA: The Zero Trust Network Architecture," Forrester Research, 2010.
[2] "Zero Trust Architecture," National Institute of Standards and Technology (NIST), Special Publication 800-207, 2020. [Online]. Available: https://doi.org/10.6028/NIST.SP.800-207
[3] Bhargavan, M. Delignat-Lavaud, and K. Bhargavan, "Transport Layer Security: Zero Trust Architecture and End-to-End Encryption," in Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, 2018, pp. 192–205.
[4] S. Maresca, J. Kampman, and D. Medina, "Implementing Identity and Access Management in Multi-Cloud Environments," in ACM International Conference on Cloud Computing Security, 2019, pp. 45–54.
[5] L. Chandramouli, "Identity as a Service (IDaaS) for Multi-Cloud Environments," in IEEE Cloud Computing, vol. 3, no. 5, pp. 32-40, Sep.-Oct. 2016, doi: 10.1109/MCC.2016.112.
[6] Naik and P. Kumar, "Behavioral Analysis for Continuous Authentication Using Machine Learning," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 745-757, Mar. 2019, doi: 10.1109/TIFS.2018.2869914.
[7] R. S. Sandhu, "Role-Based Access Control Models for Security in Multi-Tenant and Multi-Cloud Systems," in IEEE Computer, vol. 48, no. 4, pp. 80-83, Apr. 2015, doi: 10.1109/MC.2015.106.
[8] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, "Trust Management in Cloud Services," in IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2013, pp. 522–527, doi: 10.1109/CloudCom.2013.75.
[9] J. Heiser and M. Nicolett, "Defining Cloud Security Architecture for the Modern Enterprise," Gartner Research, 2020. [Online]. Available: https://www.gartner.com
[10] C. Lin and J. Yao, "Machine Learning and AI-Driven Adaptive Access Control for Cloud Security," in Proceedings of the IEEE Conference on Cloud Computing and Security, 2021, pp. 111-120.
Zero Trust, Identity and Access Management (IAM), Multi-Cloud, Cloud Security, Authentication, Access Control.