Architectural Framework for Enhancement of Data Center Security by Integrating with Identity and Access Management (IAM)
DOI:
https://doi.org/10.26821/IJSHRE.13.12.2025.131204Keywords:
Data Centre, Security, Access, IAM, Authentication, Authorization, User, DirectoryAbstract
In a world of constantly evolving cyber-crime and cyber threats, incorporating robust Cyber Security measures into the core design and operation of the Data Centre is crucial. IAM system helps to improve Data Centre security by providing a centralized way to control user, application and devices access and by allowing administrators to easily detect and respond to potential security threats encountered. Integrating Identity and Access Management (IAM) in data centers improves security and control over sensitive data and resources. Proposed Architectural framework for integration of an Identity and Access Management (IAM) system with the Data Center’s security yield advantages such as improved security, enhanced compliance, increased efficiency, increasing transparency, enabling scalability and better visibility and control on Security aspects of Data center and enhance cyber security.
References
Data Center Physical Access Security-Microsoft Service Assurance, Microsoft Learn, Article 05/08/2024, https://learn.microsoft.com/
Building Tomorrow’s Data Center: Your Journey Starts Now, White paper, FORTINET, https://www.fortinet.com/
Jonas Topp-Mugglestone, “Data Centre Security: Key Principles and Best Practices”, September 2024, STL Partners, https://stlpartmers.com/
Tracey, “Security at the data level”, Network Security, Issue 5, pp. 6-12, May 2013
M. Potts, “The state of information security,” Network Security, Vol. 2012, Issue 7, pp. 9-11.
Mayuri Dhamdhere and Sridevi Karande, “Identity and Access Management: Concept, Challenges, Solutions”, International Journal of Latest Trends in Engineering and Technology, Vol. (8), Issue (1), pp.300-308,
George A. Gellert, “Leveraging identity and access management technology to accelerate emergency COVID-19 vaccine delivery”, Therapeutic Advances in Vaccines and Immunotherapy 2023, Vol. 11: 1–6
Ishaq Azhar Mohammed, “Systematic Review of Identity Access Management in Information Security, Novateur Publications International Journal of Innovations in Engineering Research and Technology, Volume 4, Issue 7, July-2017
Dragos Marian Mangiuc, “Cloud Identity and Access Management A Model Proposal”, Accounting and Management Information Systems Vol. 11, No. 3, pp. 484–500, 2012
Ishaq Azhar Mohammed, “A significance of Identity Management as a Prerequisite for Enterprise AI on the Cloud”, 2021 IJCRT, Volume 9, Issue 8 August 2021
Michael Kunz, Ludwig Fuchs, Matthias Hummer and Gunther Pernul, “Introducing Dynamic Identity and Access Management in Organizations”, Springer International Publishing Switzerland 2015, ICISS 2015, pp. 139–158, 2015
Nida, Pinki, Harsh Dhiman, Shahnawaz Hussain, “A Survey on Identity and Access Management in Cloud Computing”, International Journal of Engineering Research & Technology (IJERT) Vol. 3 Issue 4, April – 2014
Kaushik Reddy Muppa, “Study on Cloud-Based Identity and Access Management in Cyber Security”, International Journal of Data Analytics Research and Development (IJDARD) Volume 2, Issue 1, January-June 2024, pp. 40–49
Aashish Bhardwaj, “Identity management practices in cloud computing environments”, International Journal of Cloud Computing, Vol. 3, No. 2, 2014
Temidayo Abayomi-Zannu and Isaac Odun-Ayo, “Cloud Identity Management-A Critical Analysis”, Proceedings of the International MultiConference of Engineers and Computer Scientists 2019, March 13-15, 2019
Waleed A. Alamri, Abdullah K. Almadani, “Identity and Access Management (IAM) Processes and controls Automation”, International Journal of Computer Science and Information Technology Research, Vol. 10, Issue 3, July - September 2022, pp: (5-7)
Zach Calhoun, Patrick Maribojoc, Ned Selzer, Leah Procopi, Nicola Bezzo, Cody Fleming, “Analysis of Identity and Access Management Alternatives for a Multinational Information-sharing Environment”, IEEE Xplore, 2017 Systems and Information Engineering Design Symposium (SIEDS)
Samuel Oladiipo Olabanji, Oluwaseun Oladeji Olaniyi, Chinasa Susan Adigwe, Olalekan Jamiu Okunleye and Tunbosun Oyewale Oladoyinbo, “AI for Identity and Access Management (IAM) in the Cloud: Exploring the Potential of Artificial Intelligence to Improve User Authentication, Authorization, and Access Control within Cloud-Based Systems”, Asian Journal of Research in Computer Science Volume 17, Issue 3, Page 38-56, 2024
Matthias Hummer, Michael Kunz, Michael Netter, Ludwig Fuchs and Gunther Pernul, “Adaptive identity and access management-contextual data-based policies”, Eurasip Journal on Information Security (2016), 2016
Leonardo Robert, “Integrating AI and IAM for Comprehensive Cybersecurity in GxP-Regulated Healthcare Environments”
Godwin Nzeako and Rahman Akorede Shittu, “Leveraging AI for enhanced identity and access management in cloud-based systems to advance user authentication and access control”, World Journal of Advanced Research and Reviews, 2024
Sums Uz Zaman, “Enhancing Security in Cloud-Based IAM Systems Using Real Time Anomaly Detection”, International Journal of Scientific Research and Engineering Development, Volume 8, Issue 6, Nov-Dec 2025
Surendra Vitla, “Securing the physical and digital frontier: leveraging identity and access management (IAM) to address the lack of controls on physical access to sensitive systems”, International Journal of Science and Research Archive, 2022
Abel Chukwuemeke Uzoka, Jeffrey Chidera Ogeawuchi, Abraham Ayodeji Abayomi, Oluwademilade Aderemi Agboola, Toluwase Peter Gbenle, “Advances in Cloud Security Practices Using IAM, Encryption, and Compliance Automation”, NOV 2021, IRE Journals, Volume 5, Issue 5
Kehinde Olakunle Fadare, “Optimizing Data Center Security with Zero Trust Architecture”, International Journal of Engineering and Advanced Technology Studies, 2025
Sumit Dahiya, “Identity and Access Management Integration with Enterprise Applications”, International Journal of Innovative Research in Technology 1438, IJIRT Volume 11, Issue 4
Ali M., Al-Khouri, “Optimizing Identity and Access Management (IAM) Frameworks”, International Journal of Engineering Research and Applications (IJERA), Vol. 1, Issue 3, pp.461-477
Edward Robin, “Securing Data Centers with IAM Integration”, July 19, 2023
Bhagyashree Walikar, “How Can You Integrate IAM with Data Centers Security”, http://www.cantech.in
Enhanced Security with IAM: A Comprehensive Guide, http://www.techplix.com