Zero Trust in Cloud Environments: Enforcing Identity and Access Control
Keywords:
Zero Trust Architecture, Cloud Security, Identity and Access Management (IAM)Abstract
Although cloud computing is now the core of modern IT infrastructure on the current digital terrain, this transition demands the development of more intelligent and powerful security measures. This article looks at the Zero Trust model as a required strategy for safeguarding cloud systems when conventional perimeter-based security is inadequate. The underlying concept of Zero Trust is straightforward yet strong: never trust; always check. Every access request is seen as possibly hostile rather than presuming that every element of the network is secure; hence, complete verification at every level is definitely required. In cloud-based ecosystems, where people, tools, and gadgets run across many far-off sites, this point of view is very crucial. Examining how tight identity verification, least-privilege access, and continuous authentication act as fundamental components helps one to stress the main purpose of identity and access control in running Zero Trust. Emphasizing the pragmatic concerns and benefits of using Zero Trust ideas, this paper presents a complete case study of a mid-sized corporation applying a cloud-first approach. Strong identification systems help firms drastically cut assault zones and block lateral movement during a breach, critical studies claim. The event underlines how dynamically and robustly inclusive identity providers, monitoring systems, and adaptive access restrictions must create a protection posture. This study underlines that zero trust is not only a fad but also a strategic need for cloud security dependent on the integration of theoretical ideas with pragmatic results, depending on the efficient administration of identity and access control.
Downloads
References
DeCusatis, Casimer, et al. "Implementing zero trust cloud networks with transport access control and first packet authentication." 2016 IEEE International Conference on Smart Cloud (SmartCloud). IEEE, 2016.
Vanickis, Romans, et al. "Access control policy enforcement for zero-trust-networking." 2018 29th Irish Signals and Systems Conference (ISSC). IEEE, 2018.
Indu, I., PM Rubesh Anand, and Vidhyacharan Bhaskar. "Identity and access management in cloud environment: Mechanisms and challenges." Engineering science and technology, an international journal 21.4 (2018): 574-588.
Mohammed, Ishaq Azhar. "Cloud identity and access management–a model proposal." International Journal of Innovations in Engineering Research and Technology 6.10 (2019): 1-8.
Eidle, Dayna, et al. "Autonomic security for zero trust networks." 2017 IEEE 8th Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON). IEEE, 2017.
Younis, Younis A., Kashif Kifayat, and Madjid Merabti. "An access control model for cloud computing." Journal of Information Security and Applications 19.1 (2014): 45-60.
Alansari, Shorouq, Federica Paci, and Vladimiro Sassone. "A distributed access control system for cloud federations." 2017 IEEE 37th international conference on distributed computing systems (ICDCS). IEEE, 2017.
Bates, Adam, et al. "Towards secure provenance-based access control in cloud environments." Proceedings of the third ACM conference on Data and application security and privacy. 2013.
Yan, Zheng, et al. "Flexible data access control based on trust and reputation in cloud computing." IEEE transactions on cloud Computing 5.3 (2015): 485-498.
Noor, Talal H., et al. "Trust management of services in cloud environments: Obstacles and solutions." ACM Computing Surveys (CSUR) 46.1 (2013): 1-30.
Yasodhara Varma Rangineeni, and Manivannan Kothandaraman. “Automating and Scaling ML Workflows for Large Scale Machine Learning Models”. JOURNAL OF RECENT TRENDS IN COMPUTER SCIENCE AND ENGINEERING ( JRTCSE), vol. 6, no. 1, May 2018, pp. 28-41
Wang, Shangping, Xu Wang, and Yaling Zhang. "A secure cloud storage framework with access control based on blockchain." IEEE access 7 (2019): 112713-112725.
Ruj, Sushmita, Milos Stojmenovic, and Amiya Nayak. "Privacy preserving access control with authentication for securing data in clouds." 2012 12th IEEE/ACM International symposium on cluster, cloud and grid computing (ccgrid 2012). IEEE, 2012.
Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Enforcing role-based access control for secure data storage in the cloud." The Computer Journal 54.10 (2011): 1675-1687.
Zaheer, Zirak, et al. "eztrust: Network-independent zero-trust perimeterization for microservices." Proceedings of the 2019 ACM Symposium on SDN Research. 2019.
Zhou, Lan, Vijay Varadharajan, and Michael Hitchens. "Achieving secure role-based access control on encrypted data in cloud storage." IEEE transactions on information forensics and security 8.12 (2013): 1947-1960.