Kaleru, Anjan Kumar (2025) Identity and access management: foundations, principles, and best practices. World Journal of Advanced Engineering Technology and Sciences, 15 (1). pp. 1894-1904. ISSN 2582-8266
![WJAETS-2025-0393.pdf [thumbnail of WJAETS-2025-0393.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJAETS-2025-0393.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
Identity and Access Management (IAM) forms the foundation of modern security by determining who can access what resources and when. Through six key areas—strong authentication practices, proper access controls, effective privilege management, streamlined lifecycle processes, intelligent monitoring systems, and adaptive risk management—organizations build security that works with today's evolving threats. Companies adopting comprehensive IAM strategies see fewer security breaches, faster incident response, lower costs, and happier users. Healthcare providers and financial institutions show impressive results when implementing mature IAM programs that balance robust security with smooth operations. By following a step-by-step improvement model, businesses can strengthen their security while supporting digital transformation and maintaining flexibility across complex environments.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjaets.2025.15.1.0393 |
Uncontrolled Keywords: | Identity Governance; Zero Trust Architecture; Multi-Factor Authentication; Privilege Management; Decentralized Identity |
Depositing User: | Editor Engineering Section |
Date Deposited: | 04 Aug 2025 16:15 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3135 |