Zero trust architecture in IAM with AI integration

Sahil Arora 1, * and Apoorva Tewari 2

1 Independent Researcher, Staff Product Manager, Twilio Inc.
2 Senior Product Manager, Intuit Inc.
 
Review
International Journal of Science and Research Archive, 2023, 08(02), 737–745.
Article DOI: 10.30574/ijsra.2023.8.2.0163
Publication history: 
Received on 13 January 2023; revised on 24 April 2023; accepted on 29 April 2023
 
Abstract: 
ZTA is a new model of enterprise cybersecurity that stands for continuous authentication, strict access control and dynamic verification for data, assets and identities of enterprises in multilayered infrastructures. ZTA ensures that each and every incoming request to access people, devices or applications is constantly compared to the organisation’s policy and approved, no matter if it is coming inside or outside a network, unlike a traditional perimeter-based security strategy. In an effort to enhance the compliance standards and lower the attack surface, this article expands on the basic tenets of ZTA, such as adding IAM to regulate access based on the role and permission systems. ZTA is further enhanced by AI that enables the real-time identification of threats, dynamic security access control, and risk estimation. By adopting the AI approach, ZTA can make intelligent decisions, and this makes companies able to counteract the ever-incoming cyber threats. Among the areas where ZTA and AI applications are being adopted are cloud environments, remote workforces, IoT devices, and microservices. Further research prospects are also enumerated in this document, such as developing AI-based behavioural analytics, safeguarding Edge and IoT applications, incorporating improved threat intelligence, and incorporating machine learning in ZTA processes. These developments will keep ZTA as a strong and adaptive cybersecurity framework for any corporate infrastructures and protect them from threats in related modern digital landscapes.
 
Keywords: 
Zero Trust Architecture (ZTA); Identity and Access Management (IAM); Artificial Intelligence (AI); Threat Intelligence; Zero Access; Cloud Environments; Secure Access Service Edge (SASE).
 
Full text article in PDF: