The Critical Role of Identity and Access Management in Cybersecurity | IJCT Volume 13 – Issue 3 | IJCT-V13I3P84

International Journal of Computer Techniques
ISSN 2394-2231
Volume 13, Issue 3  |  Published: May – June 2026

Author

SHARAD SHARMA

Abstract

The research investigates Identity and Access Management (IAM) which has served and will continue to serve as the essential foundational base for both legacy and contemporary cybersecurity systems. The research shows that previous security models have lost their effectiveness because modern networks operate without fixed secure boundaries, high adoption of cloud applications utilizing including Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure as a Service (IaaS) models and organizations now use hybrid work models utilizing both on-prem applications and utilizing Cloud platforms and cloud applications) while dealing with sophisticated cyber threats and zero day vulnerabilities. The research investigates how IAM developed from its basic Information Technology (IT) management duties into an advanced security system which defends different types of Identities including but not limited to Digital, Silicon (Machine and non-human) and Privileged protection. The main subjects of this paper focus on Zero Trust fundamentals and Privileged Access Management (PAM) operations and cloud identity management difficulties and security versus user experience tradeoffs. The research shows that IAM functions will continue to play a critical business requirement which protects organizations from risks while following regulations and adhering to compliance and supporting their digital transformation journey. The research explores future development paths which unite artificial intelligence systems with decentralized identity management systems.

Keywords

Identity and Access Management (IAM), Cybersecurity, Zero Trust Security, Privileged Access Management (PAM), Multi-Factor Authentication (MFA), Access Control, Digital Identity, Cyber Threats, Authentication, Authorization, Platform as a Service (PaaS), Software as a Service (SaaS) and Infrastructure as a Service (IaaS), Security Framework, Segregation of duties (SOD), Bring your own Device (BYOD), Identification, Authentication, Authorization, and Accountability (IAAA).

Conclusion

Out in the real world of digital setups, something called Identity and Access Management now acts like an invisible shield. With more companies shifting workloads into cloud-based systems, this monitoring tool becomes central to Zero Trust setups – always checking who someone is, not just letting them in by default. Instead of making assumptions, it decides whether to allow entry based on shifting danger levels at any moment. Control tightens when access gets split into tiny pieces, rights stay minimal by design, while newer ways to confirm identity – like multiple steps or skipping passwords entirely – get woven right in. What stands out is how it handles high-level risks – by regularly checking who has access, capping those rights over time. It also shrinks exposure points using smart access rules that adjust as needed. Another key point comes from meeting legal standards, thanks to precise logs kept on record activities. These records help meet recurring checks needed under rules like GDPR, HIPAA, and SOX . Further privilege access needs to be centralized and access to them should be via approved channels and all privileged actions should be logged for audit purposes. A fresh approach to identity and access management goes beyond typical tech spending – it quietly shapes how safely an organization moves forward online. When smart permission systems, machine-learning powered threat spotting, and automated rule-following are woven into daily operations, risk drops while speed stays intact. So, companies should focus on security built around individual identities. Think of IAM not just as a tool but as the core barrier against modern threats. Today’s networks are scattered, often running in clouds – this reality demands new thinking. When done right, risk drops quietly, legal obligations get easier to meet. A space where trust grows tends to last longer than one built on guesswork.

References

1)Ghadge, N. (2024). Enhancing threat detection in Identity and Access Management (IAM) systems. International Journal of Science and Research Archive, 11(2), 2050–2057. https://doi.org/10.30574/ijsra.2024.11.2.0761 2)Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and Application of Zero Trust Security: A Brief Survey. Entropy, 25(12), 1595. https://doi.org/10.3390/e25121595 3)Alsirhani, A., Ezz, M., & Mohamed Mostafa, A. (2022). Advanced Authentication Mechanisms for Identity and Access Management in Cloud Computing. Computer Systems Science and Engineering, 43(3), 967–984. https://doi.org/10.32604/csse.2022.024854 4)Umoga, U., Sodiya, E., Amoo, O., & Atadoga, A. (2024). A critical review of emerging cybersecurity threats in financial technologies. International Journal of Science and Research Archive, 11(1), 1810–1817. https://doi.org/10.30574/ijsra.2024.11.1.0284 5)Daah, C., Qureshi, A., Awan, I., & Konur, S. (2024). Enhancing Zero Trust Models in the Financial Industry through Blockchain Integration: A Proposed Framework. Electronics, 13(5), 865. https://doi.org/10.3390/electronics13050865 6)Fugkeaw, S. (2023). Achieving Decentralized and Dynamic SSO-Identity Access Management System for Multi-Application Outsourced in Cloud. IEEE Access, 11, 25480–25491. https://doi.org/10.1109/access.2023.3255885 7)Naik, N., & Jenkins, P. (2016, March 1). A Secure Mobile Cloud Identity: Criteria for Effective Identity and Access Management Standards. https://doi.org/10.1109/mobilecloud.2016.22 8)Singh, C., Thakkar, R., & Warraich, J. (2023). IAM Identity Access Management—Importance in Maintaining Security Systems within Organizations. European Journal of Engineering and Technology Research, 8(4), 30–38. https://doi.org/10.24018/ejeng.2023.8.4.307 9)Glöckler, J., Sedlmeir, J., Frank, M., & Fridgen, G. (2023). A Systematic Review of Identity and Access Management Requirements in Enterprises and Potential Contributions of Self-Sovereign Identity. Business & Information Systems Engineering, 66(4), 421–440. https://doi.org/10.1007/s12599-023-00830-x 10)Meng, L., Huang, D., An, J., Zhou, X., & Lin, F. (2022). A continuous authentication protocol without trust authority for zero trust architecture. China Communications, 19(8), 198–213. https://doi.org/10.23919/jcc.2022.08.015 11)Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2020). Dynamic Access Control and Authorization System based on Zero-trust architecture. 123–127. https://doi.org/10.1145/3437802.3437824 12)Jose Diaz Rivera, J., Muhammad, A., & Song, W.-C. (2024). Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open Journal of the Communications Society, 5, 2792–2814. https://doi.org/10.1109/ojcoms.2024.3391728 13)Chadwick, D. W., Siu, K., Lee, C., Fouillat, Y., & Germonville, D. (2013). Adding Federated Identity Management to OpenStack. Journal of Grid Computing, 12(1), 3–27. https://doi.org/10.1007/s10723-013-9283-2 14)Moallem, A. (2019). Cybersecurity Awareness Among Students and Faculty. Crc. https://doi.org/10.1201/9780429031908 15)Ayoola, V., James, U., Idoko, I., Ijiga, O., & Olola, T. (2024). Effectiveness of social engineering awareness training in mitigating spear phishing risks in financial institutions from a cybersecurity perspective. Global Journal of Engineering and Technology Advances, 20(3), 094–117. https://doi.org/10.30574/gjeta.2024.20.3.0164 16)Li, W., Cheng, H., Wang, P., & Liang, K. (2021). Practical Threshold Multi-Factor Authentication. IEEE Transactions on Information Forensics and Security, 16, 3573–3588. https://doi.org/10.1109/tifs.2021.3081263 17)Sanders, M. W., & Yue, C. (2019). Mining least privilege attribute-based access control policies. 404–416. https://doi.org/10.1145/3359789.3359805 18)Carella, A., Kotsoev, M., & Truta, T. M. (2017). Impact of security awareness training on phishing click-through rates. 4458–4466. https://doi.org/10.1109/bigdata.2017.8258485 19)Chhetri, T. R., Kurteva, A., Delong, R. J., Hilscher, R., Korte, K., & Fensel, A. (2022). Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent. Sensors (Basel, Switzerland), 22(7), 2763. https://doi.org/10.3390/s22072763 20)Sutradhar, S., Karforma, S., Bose, R., Roy, S., Djebali, S., & Bhattacharyya, D. (2023). Enhancing identity and access management using Hyperledger Fabric and OAuth 2.0: A block-chain-based approach for security and scalability for healthcare industry. Internet of Things and Cyber-Physical Systems, 4, 49–67. https://doi.org/10.1016/j.iotcps.2023.07.004 21)Ghaffari, F., Gilani, K., Bertin, E., & Crespi, N. (2021). Identity and access management using distributed ledger technology: A survey. International Journal of Network Management, 32(2). https://doi.org/10.1002/nem.2180 22)Khayretdinova, A., Kubach, M., Sellung, R., & Roßnagel, H. (2022). Conducting a Usability Evaluation of Decentralized Identity Management Solutions (pp. 389–406). Springer Fachmedien Wiesbaden. https://doi.org/10.1007/978-3-658-33306-5_19 Bairyev, M. (2023, February 28). What is Zero Trust Architecture and How Does It Work? Custom Software Development Company. https://maddevs.io/blog/what-is-zero-trust-network-architecture/

How to Cite This Paper

SHARAD SHARMA (2026). The Critical Role of Identity and Access Management in Cybersecurity. International Journal of Computer Techniques, 13(3). ISSN: 2394-2231.

© 2026 International Journal of Computer Techniques (IJCT). All rights reserved.

Submit Your Paper