Zero trust in cloud identity and access management: A review of models, advantages and limitations

Descripción del Articulo

The growing adoption of cloud computing and digital environments has increased the frequency of attacks and the likelihood of unauthorized access, against which traditional identity and access management (IAM) models prove insufficient. In this context, the Zero Trust approach emerges as a more robu...

Descripción completa

Detalles Bibliográficos
Autores: Cordova Urbina, Daily Ashley, Diaz Sifuentes, Sergio Heli, Mendoza de los Santos, Alberto Carlos
Formato: artículo
Fecha de Publicación:2025
Institución:Universidad Privada de Tacna
Repositorio:Revistas - Universidad Privada de Tacna
Lenguaje:español
OAI Identifier:oai:revistas.upt.edu.pe:article/1342
Enlace del recurso:https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/1342
Nivel de acceso:acceso abierto
Materia:gestión de la información
protección de datos
Tecnologías emergentes
Data Protection
Emerging technologies
information management
Descripción
Sumario:The growing adoption of cloud computing and digital environments has increased the frequency of attacks and the likelihood of unauthorized access, against which traditional identity and access management (IAM) models prove insufficient. In this context, the Zero Trust approach emerges as a more robust alternative that redefines security. The aim of this research was to analyze IAM models applied to cloud computing under the Zero Trust framework, as well as to identify their advantages and limitations. Using the PRISMA methodology, a search was conducted across three databases, and after applying inclusion criteria, 22 manuscripts were analyzed. The results reveal 15 IAM models based on Zero Trust that integrate artificial intelligence, blockchain, and dynamic access control, offering enhanced security in areas such as 5G, IoT, cloud, and healthcare. Nevertheless, limitations remain regarding complexity, costs, scalability, and privacy. In conclusion, these models not only strengthen security but also represent a line of inquiry and development aimed at reformulating resource protection across diverse sectors.
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).