AI-Augmented Identity and Access Management for Zero-Trust Architectures in Distributed Enterprises

Authors

  • Sateesh Kumar Nallamala Independent Researcher, USA Author

Keywords:

AI, identity and access management, zero-trust architecture, distributed enterprises

Abstract

In distributed enterprise environments, securing sensitive data and systems has become increasingly complex due to the wide dispersion of resources and varying levels of user access. The traditional approach to cybersecurity, relying on perimeter-based security models, is becoming outdated as organizations adopt more flexible, cloud-based architectures. The zero-trust security model, which assumes no implicit trust and requires continuous verification of every request, offers a more dynamic approach to security in these distributed systems. This paper explores the integration of artificial intelligence (AI) into Identity and Access Management (IAM) systems to enhance the implementation of zero-trust architectures in distributed enterprises. AI-augmented IAM systems provide advanced capabilities for user authentication, access control, and threat detection, ensuring more robust security by analyzing patterns and anomalies in real-time. This paper discusses the components of a zero-trust framework, the role of AI in IAM, and how this integration facilitates more adaptive and resilient security measures for modern enterprise environments. It also explores the challenges and future directions of implementing AI in IAM systems for zero-trust architectures.

Downloads

Download data is not yet available.

References

Bhardwaj, R., & Gupta, S. (2020). Zero-trust architecture for distributed enterprises: Principles and implementation. Journal of Information Security, 45(3), 123-136.

Madupati, Bhanuprakash. "Web Development in the Next Generation Using AI and Data Science." Available at SSRN 5076682 (2022).

Gupta, Neha, and Vivek Kapoor. "Hybrid cryptographic technique to secure data in web application." Journal of Discrete Mathematical Sciences and Cryptography 23.1 (2020): 125-135.

Kalluri, Kartheek. "ENHANCING CUSTOMER SERVICE EFFICIENCY: A COMPARATIVE STUDY OF PEGA'S AI-DRIVEN SOLUTIONS."

S. Kumari, “Agile Cloud Transformation in Enterprise Systems: Integrating AI for Continuous Improvement, Risk Management, and Scalability”, Australian Journal of Machine Learning Research & Applications, vol. 2, no. 1, pp. 416–440, Mar. 2022

Madupati, Bhanuprakash. "Data Science in Public Relations Software Development." Available at SSRN 5076688 (2022).

Gondaliya, Jayraj, et al. "Hybrid security RSA algorithm in application of web service." 2018 1st International Conference on Data Intelligence and Security (ICDIS). IEEE, 2018.

Kalluri, Kartheek. "Federate Machine Learning: A Secure Paradigm for Collaborative AI in Privacy-Sensitive Domains." International Journal on Science and Technolo-gy 13.4 (2022): 1-13.

S. Kumari, “AI-Enhanced Agile Development for Digital Product Management: Leveraging Data-Driven Insights for Iterative Improvement and Market Adaptation”, Adv. in Deep Learning Techniques, vol. 2, no. 1, pp. 49–68, Mar. 2022

Singu, Santosh Kumar. "Impact of Data Warehousing on Business Intelligence and Analytics." ESP Journal of Engineering & Technology Advancements 2.2 (2022): 101-113.

Madupati, Bhanuprakash. "Machine Learning for Cybersecurity in Industrial Control Systems (ICS)." Available at SSRN 5076696 (2022).

Kalluri, Kartheek. "Optimizing Financial Services Implementing Pega's Decisioning Capabilities for Fraud Detection." International Journal of Innovative Research in Engineering & Multidisciplinary Physical Sciences 10.1 (2022): 1-9.

S. Kumari, “AI-Driven Cybersecurity in Agile Cloud Transformation: Leveraging Machine Learning to Automate Threat Detection, Vulnerability Management, and Incident Response”, J. of Art. Int. Research, vol. 2, no. 1, pp. 286–305, Apr. 2022

Singu, Santosh Kumar. "ETL Process Automation: Tools and Techniques." ESP Journal of Engineering & Technology Advancements 2.1 (2022): 74-85.

S. Kumari, “AI-Driven Cloud Transformation for Product Management: Optimizing Resource Allocation, Cost Management, and Market Adaptation in Digital Products ”, IoT and Edge Comp. J, vol. 2, no. 1, pp. 29–54, Jun. 2022

Madupati, Bhanuprakash. "Cybersecurity in Day-to-Day Life: A Technical Perspective." Available at SSRN 5076692 (2022).

Kalluri, Kartheek. "Blockchain Augment AI: Securing Decision Pipelines Decentralized in Systems."

S. Kumari, “Cybersecurity in Digital Transformation: Using AI to Automate Threat Detection and Response in Multi-Cloud Infrastructures ”, J. Computational Intel. & Robotics, vol. 2, no. 2, pp. 9–27, Aug. 2022

Madupati, Bhanuprakash. "Cybersecurity in the Airline Industry: A Technical Perspective." Available at SSRN 5076684 (2022)

Downloads

Published

29-12-2023

How to Cite

[1]
Sateesh Kumar Nallamala, “AI-Augmented Identity and Access Management for Zero-Trust Architectures in Distributed Enterprises”, American J Data Sci Artif Intell Innov, vol. 3, pp. 74–79, Dec. 2023, Accessed: Mar. 07, 2026. [Online]. Available: https://ajdsai.org/index.php/publication/article/view/39