Abstract


 The goal of this study is to put encryption key management strategies into practice while taking legal restrictions and the necessity for data accessibility into account. In order to reduce the danger of unauthorized access to cloud resources, this article explores the creation of Identity and Access Management (IAM) solutions that successfully apply role-based access control and abide by the least privilege principle. The advancement of digital business is both facilitated and disrupted by the usage of cloud technologies. Spending on cloud computing platforms and infrastructure is expected to rise significantly, with a compound annual growth rate (CAGR) of 30% predicted for the period between 2013 and 2018. In comparison, the corporate IT industry as a whole is anticipated to develop at a rate that is quite slow—5%. Additionally, an increasing number of businesses—precisely 85%—are seeing the benefits of using several cloud platforms to boost employee productivity, encourage collaboration, and spur corporate innovation. Regulations and standards are quite complicated, with possibilities for repetition and occasionally discrepancies. Utilizing existing standard models, patterns, architectures, and best practices is one efficient way to manage the difficulties brought on by compliance complexity, uncertainties, and overlaps. Examining regulatory practices and looking for overlaps have been efforts.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call