Identity-Centric Security for Cloud Workloads
DOI:
https://doi.org/10.47363/JAICC/2022(1)361Keywords:
Identity-Centric Security, Cloud Workloads, Authentication, Continuous Monitoring, ComplianceAbstract
This paper discusses identity-centric security as a crucial approach for protecting cloud workloads in the contemporary world of integrated networks. It seeks to fulfill this need by explaining the importance of securing cloud workloads as cloud computing has become central to organizational functionalities. The review focuses on the importance of identity-centric security and the change from perimeter protection approaches, which are no longer effective, to more sophisticated identity assurance and ubiquitous authentication. It outlines difficulties related to cloud workloads and provides prospective solutions stressing identity management systems integration. The study thus points to the need to preserve identity-centric strategies for improving cloud security, managing risks, and being compliant with the existing regulations. Some advice for practice consists of implementing reliable identity solutions, monitoring,
cloud supplier cooperation, end-user education, and security audits. According to the existing studies, future research directions should focus on creating new identity-based security paradigms that are appropriate to modern cloud infrastructures and carry out longitudinal studies to see how effective the created models of identity-based security are in getting through the real test of time. In summary, incorporating identity-centric security remains critical for protecting innovative cloud-based workloads and guarding a firm's valuable resources from future cyber threats.
Downloads
Published
Issue
Section
License
Copyright (c) 2022 Journal of Artificial Intelligence & Cloud Computing

This work is licensed under a Creative Commons Attribution 4.0 International License.