International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 0 | Views: 110

Research Paper | Computer Science and Information Technology | United States of America | Volume 8 Issue 6, June 2019 | Popularity: 4.3 / 10


     

Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools

Satheesh Reddy Gopireddy


Abstract: In an era of growing cloud adoption, it is becoming more and more important for businesses to have robust security. CIAM (Customer Identity and Access Management) CUCCP-Cloud Customer Commitment Program IAM-Identity and access management the key to secure the cloud workloads is always important, especially in DevSecOps model which circulates around embedding security at each phase of that SDLC. In this article, we will explore the best IaC strategies which can be used to adopt semantic IAM in cloud-based DevSecOps workflows. Among other things, we look at the role of a Zero Trust architecture and how IAM processes can be automated with AI & ML algorithms for better access controls. The paper also touches on IAM-as-Code, that can bring identity management more in line with DevSecOps principles so security is a continuous process across development and operations. Enforcing controls like IAM on the workloads they run, can protect organisations against unauthorised access and reduce risk of data breaches whilst remaining compliant with industry regulations.


Keywords: cloud security, DevSecOps, identity management, access control, Zero Trust architecture


Edition: Volume 8 Issue 6, June 2019


Pages: 2454 - 2456



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Satheesh Reddy Gopireddy, "Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools", International Journal of Science and Research (IJSR), Volume 8 Issue 6, June 2019, pp. 2454-2456, https://www.ijsr.net/getabstract.php?paperid=SR19629111757



Similar Articles

Downloads: 0

Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023

Pages: 1936 - 1940

Zero Trust Network Segmentation

Anvesh Gunuganti

Share this Article

Downloads: 0

New Innovation and Idea, Computer Science and Information Technology, Tanzania, Volume 13 Issue 11, November 2024

Pages: 1342 - 1344

Blockchain and Artificial Intelligence: A Synergistic Approach for Digital Identity and Security in E-Commerce

Costantine Paschal Kulwa

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science and Information Technology, India, Volume 11 Issue 5, May 2022

Pages: 2111 - 2118

Zero Trust Architecture: Principles, Implementation, and Impact on Organizational Security

Yamini Kannan

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024

Pages: 1472 - 1481

Secure and Scalable Service-to-Service Interaction in Serverless Microservices Environments

Roshan Mahant, Sumit Bhatnagar, Vikas Mendhe

Share this Article

Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Case Studies, Computer Science and Information Technology, United States of America, Volume 13 Issue 8, August 2024

Pages: 1374 - 1382

DevSecOps in Cloud Native CyberSecurity: Shifting Left for Early Security, Securing Right with Continuous Protection

Ramakrishna Manchana

Share this Article



Top