ISSN : 2583-2646

Zero Trust Identity and Access Management (IAM) in Multi-Cloud Environments

ESP Journal of Engineering & Technology Advancements
© 2023 by ESP JETA
Volume 3  Issue 2
Year of Publication : 2023
Authors : Hariprasad Sivaraman
:10.56472/25832646/JETA-V3I6P108

Citation:

Hariprasad Sivaraman, 2023. "Zero Trust Identity and Access Management (IAM) in Multi-Cloud Environments ESP Journal of Engineering & Technology Advancements" 3(2): 135-139.

Abstract:

With multi-cloud strategies being adopted globally, managing identity and access across cloud platforms is a problem that can longer be ignored. The single environment Identity and Access Management (IAM) solutions can hardly enforce the same policy (consistency) and the inter-cloud/gen interoperability between clouds or agility in complex threats landscapes, and are non-multi cloud (non-support). This research paper presents a Zero Trust IAM model designed for multi-cloud ecosystems, with identity verification, unified governance, continuous authentication in Watchful Security Zones (WSZs), and micro-segmentation to break identities up into separate segments that can be isolated. It establishes a unified identity layer between cloud providers for security, compliance and ease of operation.

References:

[1] J. Kindervag, "Build Security into Your Network’s DNA: The Zero Trust Network Architecture," Forrester Research, 2010.

[2] "Zero Trust Architecture," National Institute of Standards and Technology (NIST), Special Publication 800-207, 2020. [Online]. Available: https://doi.org/10.6028/NIST.SP.800-207

[3] Bhargavan, M. Delignat-Lavaud, and K. Bhargavan, "Transport Layer Security: Zero Trust Architecture and End-to-End Encryption," in Proceedings of the 27th USENIX Security Symposium, Baltimore, MD, 2018, pp. 192–205.

[4] S. Maresca, J. Kampman, and D. Medina, "Implementing Identity and Access Management in Multi-Cloud Environments," in ACM International Conference on Cloud Computing Security, 2019, pp. 45–54.

[5] L. Chandramouli, "Identity as a Service (IDaaS) for Multi-Cloud Environments," in IEEE Cloud Computing, vol. 3, no. 5, pp. 32-40, Sep.-Oct. 2016, doi: 10.1109/MCC.2016.112.

[6] Naik and P. Kumar, "Behavioral Analysis for Continuous Authentication Using Machine Learning," in IEEE Transactions on Information Forensics and Security, vol. 14, no. 3, pp. 745-757, Mar. 2019, doi: 10.1109/TIFS.2018.2869914.

[7] R. S. Sandhu, "Role-Based Access Control Models for Security in Multi-Tenant and Multi-Cloud Systems," in IEEE Computer, vol. 48, no. 4, pp. 80-83, Apr. 2015, doi: 10.1109/MC.2015.106.

[8] K. Ruan, J. Carthy, T. Kechadi, and M. Crosbie, "Trust Management in Cloud Services," in IEEE International Conference on Cloud Computing Technology and Science (CloudCom), 2013, pp. 522–527, doi: 10.1109/CloudCom.2013.75.

[9] J. Heiser and M. Nicolett, "Defining Cloud Security Architecture for the Modern Enterprise," Gartner Research, 2020. [Online]. Available: https://www.gartner.com

[10] C. Lin and J. Yao, "Machine Learning and AI-Driven Adaptive Access Control for Cloud Security," in Proceedings of the IEEE Conference on Cloud Computing and Security, 2021, pp. 111-120.

Keywords:

Zero Trust, Identity and Access Management (IAM), Multi-Cloud, Cloud Security, Authentication, Access Control.