Role-Based Access Control (RBAC) in Modern Cloud Security Governance: An In-depth Analysis

Authors

  • Arun Kumar Akuthota IT Caps LLC, USA Author

DOI:

https://doi.org/10.32628/CSEIT25112793

Keywords:

Cloud Security Governance, Role-Based Access Control (RBAC), Artificial Intelligence in Security, Identity and Access Management, Zero Trust Architecture

Abstract

This article examines the evolving role of Role-Based Access Control (RBAC) in modern cloud security governance, with particular emphasis on its implementation within SAP Business Technology Platform environments. The article investigates how RBAC has transformed from a traditional access control mechanism into an AI-enhanced security framework capable of addressing contemporary cloud security challenges. Through examination of real-world implementations, the article demonstrates RBAC's effectiveness in reducing security incidents, streamlining administrative processes, and ensuring regulatory compliance. The article explores the integration of artificial intelligence and machine learning capabilities, which have significantly enhanced RBAC's ability to detect and prevent security threats while optimizing role management. Furthermore, the article evaluates the impact of RBAC on organizational efficiency, risk management, and scalability, providing insights into best practices for implementation and future trends in access control systems. Special attention is given to the convergence of RBAC with emerging technologies such as blockchain and zero trust architecture, offering a forward-looking perspective on the evolution of cloud security governance.

Downloads

References

IBRAHEEM ADEBAYO YOOSUF, “Emerging Threats in Cloud Computing Security: A Comprehensive Review,” 2024, Available : https://www.irejournals.com/formatedpaper/1706386.pdf

Pavan Navandar, “Securing Your Applications with Role-Based Access Control in SAP BTP Cockpit,” March 2023, Available: https://www.researchgate.net/publication/381718691_Securing_Your_Applications_with_Role-Based_Access_Control_in_SAP_BTP_Cockpit

Ankush Balaram Pawar, et al, “Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models: A Challenging Overview,” January 2023, Available: https://www.researchgate.net/publication/366775353_Study_and_Analysis_of_Various_Cloud_Security_Authentication_and_Data_Storage_Models_A_Challenging_Overview

securelayer7, “Reinforcing Cloud Security with Role-Based Access Control Implementation,” December 12, 2024, Available: https://blog.securelayer7.net/role-based-access-control-implementation/

SAP, “SAP BTP Security and Compliance Overview,” May 2023, Available: https://assets.dm.ux.sap.com/sap-user-groups-k4u/pdfs/230511_sap_btp_security_and_compliance_overview.pdf

“Identity and Access Management in Cloud Platforms,” Blog, Available: https://identitymanagementinstitute.org/identity-and-access-management-in-cloud-platforms/

William KANDOLO, “Ensuring AI Data Access Control in RDBMS: A Comprehensive Review,” Available:https://openaccess.thecvf.com/content/CVPR2024W/WRD24/papers/Kandolo_Ensuring_AI_Data_Access_Control_in_RDBMS_A_Comprehensive_Review_CVPRW_2024_paper.pdf

Faten Labbene, et al, “A Risk Awareness Approach for Monitoring the Compliance of RBAC-based Policies,” July 2015, Available : https://www.researchgate.net/publication/282032195_A_Risk_Awareness_Approach_for_Monitoring_the_Compliance_of_RBAC-based_Policies

Jaibir Singh, et al, “Role-Based Access Control (RBAC) Enabled Secure and Efficient Data Processing Framework for IoT Networks,” August 2024, Available: https://www.researchgate.net/publication/383295659_Role-Based_Access_Control_RBAC_Enabled_Secure_and_Efficient_Data_Processing_Framework_for_IoT_Networks

Rubina Ghazal, et al, “Intelligent Role-Based Access Control Model and Framework Using Semantic Business Roles in Multi-Domain Environments,” 2020, Available: https://ieeexplore.ieee.org/document/8954638

Deepa Ajish, “The significance of artificial intelligence in zero trust technologies: a comprehensive review,” 2024, Available: https://jesit.springeropen.com/articles/10.1186/s43067-024-00155-z

Downloads

Published

08-04-2025

Issue

Section

Research Articles