Authors:
K. Daniel Jasper , A. S. Vignesh Raja, R. Neha, S. Suman Rajest, R. Regin, Biswaranjan Senapati
Addresses:
1,2,3,5 Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India. 4Department of Research and Development & International Student Affairs, Dhaanish Ahmed College of Engineering, Chennai, Tamil Nadu, India. 6Department of Computer and Information Science, Parker Hannifin Corp., Illinois, United States of America. dk9127@srmist.edu.in1, ar6256@srmist.edu.in2, rr2499@srmist.edu.in3, sumanrajest414@gmail.com4, regin12006@yahoo.co.in5, bsenapati@ualr.edu6
Identity and Access Management (IAM) system aimed at enhancing security, streamlining authentication processes, enforcing access controls, and monitoring user activities effectively. The system incorporates various security measures, including biometric identification, Challenge-Handshake Authentication Protocol (CHAP) authentication, Role-Based Access Control (RBAC), and User Behavior Analytics (UBA), to address key security challenges and fortify the organization’s security posture. Biometric identification provides a highly secure and reliable method for authenticating users, leveraging unique physiological traits such as fingerprints or facial features. CHAP authentication introduces cryptographic mechanisms to verify user identities and prevent unauthorized access. RBAC facilitates granular access control, while UBA enhances threat detection capabilities and supports compliance efforts. Integrating these security measures has yielded tangible benefits, including improved authentication integrity, reduced risk of unauthorized access, enhanced threat detection, and better compliance adherence. By adopting a multi-layered approach to security and leveraging advanced technologies, the IAM system provides organizations with the tools to safeguard sensitive data and resources effectively. Ongoing investment in IAM technologies and practices will be crucial to adapting to evolving security threats and maintaining a secure IT environment. This aims to layer security principles so that data is safeguarded from threat actors and protected from data breaches, prevent insider threats from occurring, and implement security to a network and organization.
Keywords: Identity Access Management; Authentication and Authorization; Accounting Identification; Biometric Challenge; Handshake Authentication Protocol; Role-Based Access Control; User Behavioural Analytics.
Received on: 15/04/2023, Revised on: 11/08/2023, Accepted on: 02/10/2023, Published on: 20/12/2023
FMDB Transactions on Sustainable Computing Systems, 2023 Vol. 1 No. 4, Pages: 171-189