ANALYSIS OF MODERN APPROACHES TO ACCESS MANAGEMENT IN A CLOUD ENVIRONMENT

DOI: 10.31673/2409-7292.2025.017186

Authors

  • А. Р. Абібулаєв, (Abibulaev A.R.) Information Security Department, Lviv Polytechnic National University
  • А. З. Піскозуб, (Piskozub A.Z.) Information Security Department, Lviv Polytechnic National University

DOI:

https://doi.org/10.31673/2409-7292.2025.017186

Abstract

With the increasing use of cloud technologies, access management is becoming a key aspect of cybersecurity. Given the
global digital transformation, organizations are increasingly migrating their services and data to cloud environments, which
poses new challenges in terms of security, scalability, and regulatory compliance. Traditional access management approaches
used in on-premises environments are not always effective in distributed cloud ecosystems, which requires the development of
new methods of authentication, authorization, and access monitoring. Current trends in information security are aimed at the
expanded use of the Zero Trust model, adaptive multi-factor authentication (Multi-Factor Authentication, MFA), as well as access management systems (Cloud Identity & Access Management, Cloud IAM), which provide centralized account
management and control of the level of trust for each access request. The growing popularity of hybrid and multi-cloud
environments also adds complexity to the deployment of effective access control systems.
The lack of a single standard for access management across cloud providers forces organizations to adopt complex
approaches such as Principal of Least Privilege (PoLP), network micro-segmentation, and User Behavior Analytics (UBA). This
means that companies must not only implement technology solutions for access management, but also ensure access auditing,
user activity monitoring, and compliance policy enforcement. This study analyzes current approaches to access control,
including Identity and Access Management (IAM), Privileged Access Management (PAM), the Zero Trust model, and the PoLP
(Least Privilege) principle. It emphasizes the importance of integrating artificial intelligence (AI), machine learning (ML), and
natural language processing (NLP) into monitoring and anomaly detection processes, which allows for increased adaptability
of security policies. The prospects for the transition to automated risk analysis are also considered, when behavioral analytics
helps to identify threats in a timely manner and reduce the number of false positives. The role of compliance with international
standards and regulatory requirements for unified security management in multi-cloud environments is emphasized. As a result,
a combined and adaptive approach to access management, which relies on AI/ML/NLP and carefully tuned access policies,
becomes a key factor in protecting corporate assets in the modern cyberspace ecosystem.
The results of the study will be useful for IT departments and security professionals who implement or improve access
management systems in dynamic cloud environments to ensure a high level of protection and compliance with regulatory
requirements, and also provides an understanding of current trends in the development of access management systems.
Keywords: access management, cloud technologies, data security, IAM, PAM, Zero Trust.

References
1. Volodymyr Khoma, Aziz Abibulaiev, Andrian Piskozub, and Taras Kret. (2024). Comprehensive Approach
for Developing an Enterprise Cloud Infrastructure, in: Cybersecurity Providing in Information and Telecommunication
Systems II Vol. 3654 (2024) pp. 201–215.
2. Chava, A. (2024). APPLICATION SECURITY AND LEAST PRIVILEGE ACCESS IN MODERN
DEVOPS. The American Journal of Engineering and Technology, 6(10), 75-85. DOI: https://doi.org/10.37547/
tajet/Volume06Issue10-09
3. Mandru, S. (2022). PAM (Privileged Access Management) and DevOps: Secure Management of Privileged
Accounts: Integrating PAM with DevOps Practices To Ensure Secure Development Processes. J Artif Intell Mach Learn
& Data Sci 2022, 1(1), 783-787. DOI: https://doi.org/10.51219/JAIMLD/sri-kanth-mandru/194
4. Garbis, J., Chapman, J.W. (2021). Privileged Access Management. In: Zero Trust Security. Apress, Berkeley,
CA. DOI: https://doi.org/10.1007/978-1-4842-6702-8_12
5. Tuononen, H. (2023). Privileged access management model for a managed service provider.
https://urn.fi/URN:NBN:fi:amk-2023052614542
6. Taiwo Awoyinfa, James Greenwood, and Varvara Semenova. (2023). Temporary elevated access management
with IAM Identity Center, AWS Security Blog © 2024, Amazon Web Services, Inc. or its affiliates. All rights reserved,
(Apr.2023). URL: https://aws.amazon.com/blogs/security/temporary-elevated-access-management-with-iam-identitycenter/ (дата звернення: 24.02.2025).
7. Semko, D., & Gerasymchuk, T. V. (2023). Securing your aws workloads: best practices for Identity and Access
Management. URL: https://api.dspace.khadi.kharkov.ua/server/api/core/bitstreams/1563bd9d-56a8-4d47-99ccda50c5db5a92/content (дата звернення: 12.02.2025).
8. BasavaRaju, D. K. (2019). Single Sign on Using Cloud Computing. JETIR-International Journal of Emerging
Technologies and Innovative Research (www. jetir. org), ISSN, 2349-5162. ISSN: 2349-5162
9. National Security Agency (NSA). (2023). Zero Trust Guidance. URL: https://media.defense.
gov/2023/Mar/14/2003178390/-1/-1/0/CSI_Zero_Trust_User_Pillar_v1.1.PDF (дата звернення: 01.02.2025).
10. Ghadge, N. (2024). Enhancing threat detection in Identity and Access Management (IAM)
systems. International Journal of Science and Research Archive, 11(2), 2050-2057. DOI: https://doi.org/10.30574/
ijsra.2024.11.2.0761
11. PCI Security Standards Council, LLC, Payment Card Industry Data Security Standard: Requirements and
Testing Procedures, v4.0 (2022) © 2006 - 2022 PCI Security Standards Council, LLC. All rights reserved. URL:
https://www.commerce.uwo.ca/pdf/PCI-DSS-v4_0.pdf (дата звернення: 03.02.2025).
12. REGULATION (EU) 2016/679 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 27 April
2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such
data, and repealing Directive 95/46/EC (General Data Protection Regulation). (2016). URL: https://eurlex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679 (дата звернення: 13.02.2025).
13.Josang, A. (2025). IAM—Identity and Access Management. In: Cybersecurity. Springer, Cham. DOI:
https://doi.org/10.1007/978-3-031-68483-8_9
14. W. Tirtadjaja, M. E. Rana and K. Shanmugam, (2021). Managing High Privileged Accounts in IT Enterprise:
Enhanced Security Infrastructure, International Conference on Data Analytics for Business and Industry (ICDABI),
Sakheer, Bahrain, pp. 655-660, DOI: https://doi.org/10.1109/ICDABI53623.2021.9655847
15. Fortinet, (2025). What Is Privileged Access Management (PAM)? Copyright © 2025 Fortinet, Inc. All Rights
Reserved. URL: https://www.fortinet.com/resources/cyberglossary/privileged-access-management (дата звернення:
18.02.2025).
16. GeeksforGeeks, (2025). Introduction of Single-Sign On (SSO). (2024). @GeeksforGeeks, Sanchhaya
Education Private Limited, All rights reserved. URL: https://www.geeksforgeeks.org/introduction-of-single-sign-on-sso/
(дата звернення: 18.02.2025).
17. InstaSafe, (2025). Choosing the right Zero Trust architecture. Zero Trust Blog. URL:
https://instasafe.com/blog/choosing-the-right-zero-trust-architecture/ (дата звернення: 20.02.2025).
18.Johnny, R. (2019). Identity and Access Management in Zero Trust Frameworks. URL:
https://www.researchgate.net/profile/RickyJohnny/publication/388106052_Identity_and_Access_Management_in_Zero_Trust_Frameworks/links/678a377d98c4e9
67fa6712e2/Identity-and-Access-Management-in-Zero-Trust-Frameworks.pdf (дата звернення: 20.02.2025).
19. AWS Prescriptive Guidance: Embracing Zero Trust: A strategy for secure and agile business transformation
Copyright © 2024 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. URL:
https://docs.aws.amazon.com/pdfs/prescriptive-guidance/latest/strategy-zero-trust-architecture/strategy-zero-trustarchitecture.pdf (дата звернення: 21.02.2025).
20. Agorbia-Atta, C., Atalor, I., & andRichard Nachinaba, R. K. A. (2024). Leveraging AI and ML for NextGeneration Cloud Security: Innovations in Risk-Based Access Management. World Journal of Advanced Research and
Reviews, 23(3). DOI: https://doi.org/10.30574/wjarr.2024.23.3.2788
21. Singh, C., Thakkar, R. and Warraich, J. 2023. IAM Identity Access Management—Importance in Maintaining
Security Systems within Organizations. European Journal of Engineering and Technology Research. 8, 4 (Aug. 2023),
30–38. DOI: https://doi.org/10.24018/ejeng.2023.8.4.307
22. Ismail, W. S. (2024). Threat Detection and Response Using AI and NLP in Cybersecurity. J. Internet Serv. Inf.
Secur., 14(1), 195-205. DOI: https://doi.org/10.58346/JISIS.2024.I1.013
23. Olabanji, S. O., Olaniyi, O. O., Adigwe, C. S., Okunleye, O. J., & Oladoyinbo, T. O. (2024). AI for Identity
and Access Management (IAM) in the cloud: Exploring the potential of artificial intelligence to improve user
authentication, authorization, and access control within cloud-based systems. Authorization, and Access Control within
Cloud-Based Systems (January 25, 2024). DOI: https://doi.org/10.9734/AJRCOS/2024/v17i3423

Published

2025-05-09

Issue

Section

Articles