Zero trust in cloud identity and access management: A review of models, advantages and limitations
Descripción del Articulo
The growing adoption of cloud computing and digital environments has increased the frequency of attacks and the likelihood of unauthorized access, against which traditional identity and access management (IAM) models prove insufficient. In this context, the Zero Trust approach emerges as a more robu...
| Autores: | , , |
|---|---|
| Formato: | artículo |
| Fecha de Publicación: | 2025 |
| Institución: | Universidad Privada de Tacna |
| Repositorio: | Revistas - Universidad Privada de Tacna |
| Lenguaje: | español |
| OAI Identifier: | oai:revistas.upt.edu.pe:article/1342 |
| Enlace del recurso: | https://revistas.upt.edu.pe/ojs/index.php/ingenieria/article/view/1342 |
| Nivel de acceso: | acceso abierto |
| Materia: | gestión de la información protección de datos Tecnologías emergentes Data Protection Emerging technologies information management |
| Sumario: | The growing adoption of cloud computing and digital environments has increased the frequency of attacks and the likelihood of unauthorized access, against which traditional identity and access management (IAM) models prove insufficient. In this context, the Zero Trust approach emerges as a more robust alternative that redefines security. The aim of this research was to analyze IAM models applied to cloud computing under the Zero Trust framework, as well as to identify their advantages and limitations. Using the PRISMA methodology, a search was conducted across three databases, and after applying inclusion criteria, 22 manuscripts were analyzed. The results reveal 15 IAM models based on Zero Trust that integrate artificial intelligence, blockchain, and dynamic access control, offering enhanced security in areas such as 5G, IoT, cloud, and healthcare. Nevertheless, limitations remain regarding complexity, costs, scalability, and privacy. In conclusion, these models not only strengthen security but also represent a line of inquiry and development aimed at reformulating resource protection across diverse sectors. |
|---|
Nota importante:
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).
La información contenida en este registro es de entera responsabilidad de la institución que gestiona el repositorio institucional donde esta contenido este documento o set de datos. El CONCYTEC no se hace responsable por los contenidos (publicaciones y/o datos) accesibles a través del Repositorio Nacional Digital de Ciencia, Tecnología e Innovación de Acceso Abierto (ALICIA).