Kaleru, Anjan Kumar (2025) Enterprise IAM security: 6 Critical implementation areas. World Journal of Advanced Research and Reviews, 26 (1). pp. 3072-3082. ISSN 2581-9615
![WJARR-2025-1356.pdf [thumbnail of WJARR-2025-1356.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-1356.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
In today's digital world, strong Identity and Access Management (IAM) serves as the foundation of effective cybersecurity defenses. By controlling who can access what resources, IAM helps organizations protect their valuable digital assets from growing threats like data breaches and stolen credentials. This article examines IAM fundamentals, key components, regulatory compliance requirements, and industry-specific applications across financial services, healthcare, and government sectors. It explores emerging technologies such as Identity-as-a-Service, adaptive authentication, and decentralized identity that are reshaping the IAM landscape. By implementing zero trust architectures, automating identity processes, establishing comprehensive governance, and deploying continuous monitoring, organizations can significantly enhance security posture while supporting operational efficiency and compliance objectives in increasingly complex digital environments.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.1.1356 |
Uncontrolled Keywords: | Identity Governance; Zero Trust Architecture; Privilege Management; Authentication Security; Security Maturity Model |
Depositing User: | Editor WJARR |
Date Deposited: | 27 Jul 2025 13:02 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/2140 |