Think Tank Methods - Identity and Access Management on the cloud: The Misses!

 

This blog entry required us to choose a technology and trend from the Horizon report to discuss. My Horizon report of choice is about Information Security (Educause, 2021).  And the technology I chose to discuss is Identity and Access Management. In its third annual report on emerging trends in science and technology S and T published by the Army, one of its primary objectives aiming to inform leaders across the U.S. Army and stakeholders in the joint, interagency, and international community on S and T trends likely to influence the future operating environment and shape warfighting capabilities over the next 30 years concludes that more than 100 billion devices will be connected to the Internet by 2045. These include mobile phones and wearable devices, medical devices, electrical appliances, industrial sensors, surveillance cameras, cars, and clothing. (“Emerging science and technology trends: 2016-2045: A synthesis of leading forecasts,” 2016). We can already see how vital Identity and access management are here, which considerably increases potential cybercrime risks.

To effectively manage digital identities, Identity management systems need to combine processes, technologies, and strategies and specify how users use them to access multiple resources through a single sign-on mechanism ensuring better control of the personal data dissemination (Mohamed Dafir Ech-Cherif, 2019). In particular, the current identity management landscape and identity federation realm have end-users select an identity provider (IdP) who provides all user attributes to a service provider (SP) that are required to gain access to protected services (Mohamed Dafir Ech-Cherif, 2019)

Wouldn't it be super cool to present a novel Access Intelligence approach using AI and ML to selectively enable access to external users who have been successfully authenticated by an IAM system into a tenant, mapping users to specific reports in a self-service cloud reporting platform employing a Bring Your Own Identity concept?

The problem usually is, when managing External Identities, cloud-based IAM solutions and other traditional implementations tend to focus more on how users want to sign in to apps and resources in a tenant. They, however, pay little to no attention to users’ relationship to the tenant organization.

Forces that impact the trend and technology

The first of two forces that seem to impact the trend and technology are technological implications concerning how classic identity management and access control programs are based on a centralized, trusted entity with evolving identity management and access control protocols. The second aspect seems to be temporal, relating to future interactions between Identity Elements.


References

Educause. (2021, February 9). Horizon Reports: Identity and access management. Library | EDUCAUSE. https://library.educause.edu/topics/cybersecurity/identity-and-access-management

Emerging science and technology trends: 2016-2045: A synthesis of leading forecasts. (2016, April 1). DTIC. https://apps.dtic.mil/sti/citations/AD1076894

Msmimart. (2021, July 13). Compare external identities - Azure active directory. Developer tools, technical documentation and coding examples | Microsoft Docs. https://docs.microsoft.com/en-us/azure/active-directory/external-identities/compare-with-b2c

Mohamed Dafir Ech-Cherif, E. L. K. (2019, 2019

2021-07-05). A Hybrid Scheme for an Interoperable Identity Federation System Based on Attribute Aggregation Method. Computers, 8(3), 51. https://doi.org/10.3390/computers8030051

IAM identities (users, user groups, and roles). (n.d.). https://docs.aws.amazon.com/IAM/latest/UserGuide/id.html

 



























Comments

Popular Posts