Building Resilient Security Systems with Identity Access Management or Identity Access Management as a Pillar of Cybersecurity in Organizations

Authors

  • Sandeep Singh Senior system and infrastructure engineer information security, Bentonville, USA

Keywords:

Identity Access Management, Cybersecurity, access control, data protection, resilient security systems, corporate infrastructure, digital transformation, threat protection

Abstract

This article examines the implementation of identity access management (IAM) systems as a key component in building resilient and secure cybersecurity infrastructures within organizations. The threats faced by digital systems necessitate strict access control to protect data and prevent cyberattacks. The objective of this study is to analyze the role of IAM systems in creating secure environments that ensure controlled access to information resources, mitigate data leakage risks, and maintain the stability and security of organizational infrastructure. The study presents theoretical aspects of IAM system functionality, reviews existing solutions, and analyzes approaches to integrating IAM with other security components, such as incident response systems,authoritative application and endpoint protection tools. The findings confirm that implementing IAM systems enhances protection against both external and internal threats. This is due to centralized access control, which minimizes the risk of human error. The materials in this article will be valuable to cybersecurity professionals, IT managers, and researchers working on improving data protection strategies. In conclusion, the study emphasizes that adopting IAM systems enables organizations to safeguard their information resources by creating architectural solutions capable of responding promptly to emerging threats.

References

Kumari S. Identity and access management: "Elevating security and efficiency: Unveiling the crucial aspects of identity and access management” // International Journal of Engineering & Technology. – 2023. – pp.1-4.

Singh C., Thakkar R., Warraich J. IAM identity Access Management—importance in maintaining security systems within organizations //European Journal of Engineering and Technology Research. – 2023. – Vol. 8 (4). – pp. 30-38.

Ramakrishnan S. Revolutionizing Role-Based Access Control: The Impact of AI and Machine Learning in Identity and Access Management // Journal of Artificial Intelligence & Cloud Computing. – 2023. – Vol. 2 (3). – pp.1-7.

Olabanji S. O. et al. AI for identity and access management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user authentication, authorization, and access control within cloud-based systems //Authorization, and Access Control within Cloud-Based Systems (January 25, 2024). – 2024. pp. 39-54.

Ghaffari F. et al. Identity and access management using distributed ledger technology: A survey //International Journal of Network Management. – 2022. – Vol. 32 (2). – pp. 1-19.

Muhammad T. et al. Integrative cybersecurity: merging zero trust, layered defense, and global standards for a resilient digital future //International Journal of Computer Science and Technology. – 2017. – Vol. 1 (4). – pp. 99-135.

Malatji M., Marnewick A. L., Von Solms S. Cybersecurity capabilities for critical infrastructure resilience //Information & Computer Security. – 2022. – Vol. 30 (2). – pp. 255-279.

Roshanaei M. Resilience at the core: critical infrastructure protection challenges, priorities and cybersecurity assessment strategies //Journal of Computer and Communications. – 2021. – Vol. 9 (8). – pp. 80-102.

Tagarev T., Sharkov G., Stoianov N. Cyber security and resilience of modern societies: A research management architecture //Information & Security. – 2017. – Vol. 38. – pp. 93-108.

Eltayeb O. The Crucial Significance of Governance, Risk and Compliance in Identity and Access Management //Journal of Ecohumanism. – 2024. – Vol. 3 (4). – pp. 2395-2405.

Downloads

Published

2024-12-28

Issue

Section

Articles

How to Cite

Sandeep Singh. (2024). Building Resilient Security Systems with Identity Access Management or Identity Access Management as a Pillar of Cybersecurity in Organizations. International Journal of Computer (IJC), 53(1), 192-199. https://www.ijcjournal.org/InternationalJournalOfComputer/article/view/2348