Identity Centric Cloud Security
Authors- Sonam Priya, Subarna Shakya
Abstract-– Cloud computing’s inherent scalability and flexibility necessitate robust Identity and Access Management (IAM) systems to ensure secure access to resources. This paper focuses on developing an identity-centric cloud security framework, with the primary goal of streamlining user authentication and access control. The project involved integrating Zendesk with the AWS console and implementing Single Sign-On (SSO) based on Role-Based Access Control (RBAC). AWS Cognito was employed to manage user identities, enabling secure authentication and authorization, while distinct roles (admin and basic) were defined to enforce granular access permissions. The implemented system successfully demonstrates secure user authentication and the effective use of RBAC to control resource access. By leveraging AWS services, the architecture provides scalability and facilitates real-time monitoring through CloudWatch, enhancing the ability to detect and respond to security incidents. The findings underscore the importance of an identity-centric security model in cloud environments and highlight the benefits of centralized identity management. The paper emphasizes the necessity of robust authentication and authorization mechanisms to secure cloud-based applications. The study advocates for the adoption of Identity Providers (IdPs) like AWS Cognito, which offer scalable and secure solutions for managing user identities. Furthermore, it recommends the careful definition of roles and permissions aligned with organizational security policies and continuous monitoring to maintain a strong security posture in the cloud.