A Zero Trust Approach to Cloud Resource Access Request Management and Authorization

  • Unique Paper ID: 163478
  • Volume: 10
  • Issue: 11
  • PageNo: 2069-2074
  • Abstract:
  • In line with the Zero Trust philosophy, this study presents a complex solution that optimizes AWS IAM access control inside a networked architecture. The cornerstone is the Access Management Module, which uses a Zero Trust perspective to enable easy provisioning, modification, and revocation of user access to AWS services. The Continuous Monitoring Module examines CloudTrail logs in real-time, using anomaly detection algorithms to proactively detect security violations and rigorously compare user records against enterprise limitations. The Usage Reporting Dashboard facilitates informed decision-making by offering visually intuitive analysis that aligns with Zero Trust principles. Following the Zero Trust tenet, the Predictive Modeling Module uses past data to train a machine learning model for dynamic risk assessment, strengthening the system’s defenses against potential threats. With the help of this integrated architecture, an effective Zero Trust-oriented AWS IAM Access Management Portal is established, successfully handling changing access control and security concerns.

Cite This Article

  • ISSN: 2349-6002
  • Volume: 10
  • Issue: 11
  • PageNo: 2069-2074

A Zero Trust Approach to Cloud Resource Access Request Management and Authorization

Related Articles