Innovations in Infrastructure Automation: Advancing IAM in Cloud Security
DOI:
https://doi.org/10.32628/CSEIT25111223Keywords:
Cloud Security Automation, Identity Access Management, Artificial Intelligence, Serverless Architecture, Quantum-Resistant CryptographyAbstract
This article explores recent innovations in infrastructure automation that enhance cloud security and Identity and Access Management (IAM) systems. The focus lies on adopting AI-driven IAM solutions that enable dynamic role evolution and access management, along with integrating advanced technologies for automated incident response. The implementation significantly improves threat detection, response times, and security posture. The article encompasses the emergence of serverless IAM architectures, their benefits in access control, and their contribution to data privacy. Through examining integration challenges and future directions, this work provides insights into cutting-edge technologies that enhance security and compliance in cloud environments.
Downloads
References
Gartner, Inc., "Forecast: Public Cloud Services, Worldwide, 2022-2028, 2Q24 Update," Available: https://www.gartner.com/en/documents/5541595.
Palo Alto Networks, "The State of Cloud-Native Security Report 2024," Available: https://www.paloaltonetworks.com/state-of-cloud-native-security.
J. K. Waters, "Cloud Security Alliance Report Plots Path to Trustworthy AI," 2024. Available: https://campustechnology.com/Articles/2024/11/20/Cloud-Security-Alliance-Report-Plots-Path-to-Trustworthy-AI.aspx.
D. Gupta, "The Impact Of AI On Identity And Access Management," 2023. Available: https://www.forbes.com/councils/forbestechcouncil/2023/03/27/the-impact-of-ai-on-identity-and-access-management/
J. K. Waters, "Cybersecurity resilience emerges as top priority for Indian organizations: Cisco's Security Outcomes Report," 2024. Available: https://www.expresscomputer.in/news/cybersecurity-resilience-emerges-as-top-priority-for-indian-organizations-ciscos-security-outcomes-report/92546/.
NTT Data, "Global Threat Intelligence Report," 2024. Available: https://us.nttdata.com/en/insights/global-threat-intelligence-report.
Orca Security, "2024 State of Cloud Security Report," 2024. Available: https://orca.security/wp-content/uploads/2024/02/2024-State-of-Cloud-Security-Report.pdf.
B. Casey, "Serverless Security Best Practices," 2023. Available: https://www.beyondtrust.com/blog/entry/serverless-security-best-practices.
Veritis, "Identity and Access Management Trends for 2024," 2024. Available: https://www.veritis.com/blog/identity-and-access-management-trends/.
Broadridge, "2024 Digital Transformation & Next-Gen Technology Study," 2024. Available: https://www.broadridge.com/2024-digital-transformation-study.
Strategy MRC, "Cloud Network Security Market Forecasts to 2030 - Global Analysis By Security Type," 2024. Available: https://www.strategymrc.com/report/cloud-network-security-market.
AI TechPark, "The Top Six Quantum Computing Trends for 2024," 2024. Available: https://ai-techpark.com/the-top-six-quantum-computing-trends-for-2024/.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.