Downloads: 1
Research Paper | Computer Science and Information Technology | Volume 15 Issue 1, January 2026 | Pages: 1747 - 1752 | India
IAM (Identity and Access Management) is the Core Security Control in Cloud Environments
Abstract: Cloud computing environments are highly dynamic and internet-accessible, which makes traditional perimeter-based security approaches insufficient for protecting cloud resources. In such environments, Identity and Access Management (IAM) plays a critical role by controlling access based on verified identities rather than network boundaries. This paper presents a conceptual analysis of IAM as the core security control in cloud environments. The study examines fundamental IAM concepts, including authentication, authorization, roles, permissions, and the principle of least privilege, and explains their significance in mitigating cloud security risks. In addition, the relationship between IAM and modern security models such as Zero Trust is discussed to highlight identity-first security approaches. Security risks associated with misconfigured IAM controls, including unauthorised access, data exposure, and privilege escalation, are analysed using real-world cloud security incidents. The paper further outlines recommended IAM best practices to reduce security risks and improve access governance in cloud infrastructures. The findings emphasise that effective IAM implementation is essential for strengthening cloud security posture and minimising identity-based threats.
Keywords: Identity and Access Management, Cloud Security, Authentication, Authorization, Least Privilege, Zero Trust
How to Cite?: Shaik Abdulla, "IAM (Identity and Access Management) is the Core Security Control in Cloud Environments", Volume 15 Issue 1, January 2026, International Journal of Science and Research (IJSR), Pages: 1747-1752, https://www.ijsr.net/getabstract.php?paperid=SR26129224021, DOI: https://dx.dx.doi.org/10.21275/SR26129224021