Downloads: 0 | Views: 110
Research Paper | Computer Science and Information Technology | United States of America | Volume 8 Issue 6, June 2019 | Popularity: 4.3 / 10
Strengthening Identity and Access Management in Cloud DevSecOps: Strategies and Tools
Satheesh Reddy Gopireddy
Abstract: In an era of growing cloud adoption, it is becoming more and more important for businesses to have robust security. CIAM (Customer Identity and Access Management) CUCCP-Cloud Customer Commitment Program IAM-Identity and access management the key to secure the cloud workloads is always important, especially in DevSecOps model which circulates around embedding security at each phase of that SDLC. In this article, we will explore the best IaC strategies which can be used to adopt semantic IAM in cloud-based DevSecOps workflows. Among other things, we look at the role of a Zero Trust architecture and how IAM processes can be automated with AI & ML algorithms for better access controls. The paper also touches on IAM-as-Code, that can bring identity management more in line with DevSecOps principles so security is a continuous process across development and operations. Enforcing controls like IAM on the workloads they run, can protect organisations against unauthorised access and reduce risk of data breaches whilst remaining compliant with industry regulations.
Keywords: cloud security, DevSecOps, identity management, access control, Zero Trust architecture
Edition: Volume 8 Issue 6, June 2019
Pages: 2454 - 2456
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Informative Article, Computer Science and Information Technology, India, Volume 12 Issue 4, April 2023
Pages: 1936 - 1940Zero Trust Network Segmentation
Anvesh Gunuganti
Downloads: 0
New Innovation and Idea, Computer Science and Information Technology, Tanzania, Volume 13 Issue 11, November 2024
Pages: 1342 - 1344Blockchain and Artificial Intelligence: A Synergistic Approach for Digital Identity and Security in E-Commerce
Costantine Paschal Kulwa
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science and Information Technology, India, Volume 11 Issue 5, May 2022
Pages: 2111 - 2118Zero Trust Architecture: Principles, Implementation, and Impact on Organizational Security
Yamini Kannan
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science and Information Technology, United States of America, Volume 13 Issue 4, April 2024
Pages: 1472 - 1481Secure and Scalable Service-to-Service Interaction in Serverless Microservices Environments
Roshan Mahant, Sumit Bhatnagar, Vikas Mendhe
Downloads: 6 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Case Studies, Computer Science and Information Technology, United States of America, Volume 13 Issue 8, August 2024
Pages: 1374 - 1382DevSecOps in Cloud Native CyberSecurity: Shifting Left for Early Security, Securing Right with Continuous Protection
Ramakrishna Manchana