Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis
DOI:
https://doi.org/10.32628/CSEIT25112793Keywords:
Cloud Security Governance, Role-Based Access Control (RBAC), Artificial Intelligence in Security, Identity and Access Management, Zero Trust ArchitectureAbstract
This article examines the evolving role of Role-Based Access Control (RBAC) in modern cloud security governance, with particular emphasis on its implementation within SAP Business Technology Platform environments. The article investigates how RBAC has transformed from a traditional access control mechanism into an AI-enhanced security framework capable of addressing contemporary cloud security challenges. Through examination of real-world implementations, the article demonstrates RBAC's effectiveness in reducing security incidents, streamlining administrative processes, and ensuring regulatory compliance. The article explores the integration of artificial intelligence and machine learning capabilities, which have significantly enhanced RBAC's ability to detect and prevent security threats while optimizing role management. Furthermore, the article evaluates the impact of RBAC on organizational efficiency, risk management, and scalability, providing insights into best practices for implementation and future trends in access control systems. Special attention is given to the convergence of RBAC with emerging technologies such as blockchain and zero trust architecture, offering a forward-looking perspective on the evolution of cloud security governance.
Downloads
References
IBRAHEEM ADEBAYO YOOSUF, “Emerging Threats in Cloud Computing Security: A Comprehensive Review,” 2024, Available : https://www.irejournals.com/formatedpaper/1706386.pdf
Pavan Navandar, “Securing Your Applications with Role-Based Access Control in SAP BTP Cockpit,” March 2023, Available: https://www.researchgate.net/publication/381718691_Securing_Your_Applications_with_Role-Based_Access_Control_in_SAP_BTP_Cockpit
Ankush Balaram Pawar, et al, “Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview,” January 2023, Available: https://www.researchgate.net/publication/366775353_Study_and_Analysis_of_Various_Cloud_Security_Authentication_and_Data_Storage_Models_A_Challenging_Overview
securelayer7, “Reinforcing Cloud Security with Role-Based Access Control Implementation,” December 12, 2024, Available: https://blog.securelayer7.net/role-based-access-control-implementation/
SAP, “SAP BTP Security and Compliance Overview,” May 2023, Available: https://assets.dm.ux.sap.com/sap-user-groups-k4u/pdfs/230511_sap_btp_security_and_compliance_overview.pdf
“Identity and Access Management in Cloud Platforms,” Blog, Available: https://identitymanagementinstitute.org/identity-and-access-management-in-cloud-platforms/
William KANDOLO, “Ensuring AI Data Access Control in RDBMS: A Comprehensive Review,” Available:https://openaccess.thecvf.com/content/CVPR2024W/WRD24/papers/Kandolo_Ensuring_AI_Data_Access_Control_in_RDBMS_A_Comprehensive_Review_CVPRW_2024_paper.pdf
Faten Labbene, et al, “A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies,” July 2015, Available : https://www.researchgate.net/publication/282032195_A_Risk_Awareness_Approach_for_Monitoring_the_Compliance_of_RBAC-based_Policies
Jaibir Singh, et al, “Role-Based Access Control (RBAC) Enabled Secure and Efficient Data Processing Framework for IoT Networks,” August 2024, Available: https://www.researchgate.net/publication/383295659_Role-Based_Access_Control_RBAC_Enabled_Secure_and_Efficient_Data_Processing_Framework_for_IoT_Networks
Rubina Ghazal, et al, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” 2020, Available: https://ieeexplore.ieee.org/document/8954638
Deepa Ajish, “The significance of artificial intelligence in zero trust technologies: a comprehensive review,” 2024, Available: https://jesit.springeropen.com/articles/10.1186/s43067-024-00155-z
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Computer Science, Engineering and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.