Current Volume 8
As cloud computing becomes the backbone of modern enterprise IT infrastructures, security challenges have grown in complexity, demanding advanced approaches to safeguard data, identities, and compliance. This paper explores recent advances in cloud security practices, focusing on three pivotal domains: Identity and Access Management (IAM), encryption methodologies, and compliance automation. These components collectively address the pressing need for robust security frameworks that can adapt to dynamic cloud environments, mitigate cyber threats, and ensure regulatory adherence. IAM has evolved beyond traditional role-based access control to incorporate fine-grained policies, multifactor authentication (MFA), and zero trust architectures. By integrating federated identity protocols and just-in-time access provisioning, organizations can enforce stringent access controls while enhancing user productivity. Meanwhile, advances in encryption technologies—including homomorphic encryption, quantum-resistant algorithms, and envelope encryption—offer heightened protection for sensitive data at rest, in transit, and during processing. These encryption methods are increasingly embedded into cloud-native services, enabling seamless security integration without degrading performance. Compliance automation has emerged as a critical pillar in cloud security strategy, particularly as enterprises must navigate a labyrinth of regulatory requirements such as GDPR, HIPAA, and ISO 27001. Tools and frameworks that automate policy enforcement, audit trails, and continuous compliance checks are reshaping how organizations manage risk. The integration of artificial intelligence and machine learning in compliance tools further enhances real-time anomaly detection and reduces human error. This paper presents a unified security framework that leverages IAM, encryption, and compliance automation to create a resilient and proactive security posture. Case studies from leading cloud providers illustrate practical implementations and measurable impacts, including reduced breach incidents and improved audit scores. By aligning security with DevOps practices and embedding it into the software development lifecycle, organizations can achieve security by design in multi-cloud and hybrid environments. Ultimately, this study emphasizes the need for continuous innovation and adaptive security strategies to protect critical assets and uphold stakeholder trust in the digital era.
Cloud security, Identity and Access Management (IAM), encryption, compliance automation, zero trust, multifactor authentication, secure cloud architecture, regulatory compliance, DevSecOps, cloud-native security.
IRE Journals:
Abel Chukwuemeke Uzoka , Jeffrey Chidera Ogeawuchi , Abraham Ayodeji Abayomi , Oluwademilade Aderemi Agboola , Toluwase Peter Gbenle
"Advances in Cloud Security Practices Using IAM, Encryption, and Compliance Automation" Iconic Research And Engineering Journals Volume 5 Issue 5 2021 Page 432-456
IEEE:
Abel Chukwuemeke Uzoka , Jeffrey Chidera Ogeawuchi , Abraham Ayodeji Abayomi , Oluwademilade Aderemi Agboola , Toluwase Peter Gbenle
"Advances in Cloud Security Practices Using IAM, Encryption, and Compliance Automation" Iconic Research And Engineering Journals, 5(5)