Anantula, Sai Vaishnavi (2025) Combined hyper-extensible extremely-secured zero-trust CIAM-PAM Architecture: A Modern Framework for Enterprise Identity Management. World Journal of Advanced Research and Reviews, 26 (3). pp. 216-222. ISSN 2581-9615
![WJARR-2025-2142.pdf [thumbnail of WJARR-2025-2142.pdf]](https://eprint.scholarsrepository.com/style/images/fileicons/text.png)
WJARR-2025-2142.pdf - Published Version
Available under License Creative Commons Attribution Non-commercial Share Alike.
Abstract
The Combined Hyper-Extensible Extremely-Secured Zero-Trust CIAM-PAM Architecture (CHEZ) represents a transformative framework for enterprise identity management, integrating Customer Identity and Access Management with Privileged Access Management under a unified zero-trust model. This architecture addresses the critical challenge of disconnected identity systems that create security vulnerabilities in traditional environments by implementing a comprehensive approach spanning federated identity management, advanced authentication mechanisms, microservice-based policy enforcement, and multi-layer role-based access control. The paradigm shift from perimeter-based to identity-centric security models embodied by CHEZ responds to emerging challenges including proliferating API integrations, expanding IoT ecosystems, and increasingly sophisticated identity-based attacks. Through continuous verification, least-privilege access enforcement, and AI-driven threat detection, the architecture delivers substantial security improvements while enhancing user experience. The compliance-by-design approach enables organizations to simultaneously address multiple regulatory frameworks across jurisdictions, making CHEZ particularly valuable in highly regulated industries including financial services, healthcare, and e-commerce. The architecture's scalable, distributed nature supports both cloud-native and hybrid deployment models, providing flexibility for organizations at various stages of digital transformation while delivering measurable benefits in security posture, operational efficiency, and user satisfaction.
Item Type: | Article |
---|---|
Official URL: | https://doi.org/10.30574/wjarr.2025.26.3.2142 |
Uncontrolled Keywords: | Zero-Trust Architecture; Identity Management; Federated Authentication; AI-Driven Security; Regulatory Compliance |
Depositing User: | Editor WJARR |
Date Deposited: | 20 Aug 2025 12:00 |
Related URLs: | |
URI: | https://eprint.scholarsrepository.com/id/eprint/3839 |