Identity and Access Management has become a foundational pillar of modern information security, governing how users, devices, and applications authenticate and gain access to organizational resources. As enterprises increasingly operate across hybrid environments that combine on-prem infrastructure with cloud platforms, the complexity of managing identities and enforcing access controls has grown substantially. Traditional identity models designed for centralized, perimeter-based systems are often inadequate in distributed environments where users access resources from diverse locations and devices. In this context, IAM serves as a critical mechanism for enforcing security policies, maintaining accountability, and reducing the risk of unauthorized access. Cloud computing has introduced new identity paradigms that emphasize federated authentication, dynamic authorization, and service-based identities. These paradigms differ significantly from on-prem identity systems, which typically rely on directory services, static roles, and network-based trust assumptions. Integrating these two models presents both opportunities and challenges, requiring careful alignment of identity lifecycles, access policies, and governance frameworks. Misconfigurations or inconsistencies across environments can lead to privilege escalation, data exposure, and compliance failures. This review examines Identity and Access Management in cloud and on-prem infrastructure environments, focusing on architectural models, authentication mechanisms, authorization strategies, and operational considerations. It explores how IAM technologies have evolved to support hybrid deployments and analyzes common risks associated with identity sprawl, excessive privileges, and fragmented policy enforcement. The article also highlights the role of IAM in enabling modern security approaches such as Zero Trust and least privilege access. By synthesizing established research and industry practices, this review provides a comprehensive understanding of IAM's role in securing hybrid infrastructures. The discussion aims to assist practitioners, researchers, and decision-makers in designing IAM strategies that balance security, usability, and scalability across diverse deployment models.
Building similarity graph...
Analyzing shared references across papers
Loading...
Naveen Reddy Burramukku
Building similarity graph...
Analyzing shared references across papers
Loading...
Naveen Reddy Burramukku (Sat,) studied this question.
www.synapsesocial.com/papers/698434cff1d9ada3c1fb3654 — DOI: https://doi.org/10.5281/zenodo.18454080