Home
World Journal of Advanced Engineering Technology and Sciences
International, Peer reviewed, Referred, Open access | ISSN Approved Journal

Main navigation

  • Home
    • Journal Information
    • Abstracting and Indexing
    • Editorial Board Members
    • Reviewer Panel
    • Journal Policies
    • WJAETS CrossMark Policy
    • Publication Ethics
    • Instructions for Authors
    • Article processing fee
    • Track Manuscript Status
    • Get Publication Certificate
    • Issue in Progress
    • Current Issue
    • Past Issues
    • Become a Reviewer panel member
    • Join as Editorial Board Member
  • Contact us
  • Downloads

ISSN: 2582-8266 (Online)  || UGC Compliant Journal || Google Indexed || Impact Factor: 9.48 || Crossref DOI

Fast Publication within 2 days || Low Article Processing charges || Peer reviewed and Referred Journal

Research and review articles are invited for publication in Volume 18, Issue 3 (March 2026).... Submit articles

The Role of Identity and Access Management (IAM) in Modern Cybersecurity: Implementing Zero Trust Principles for Enhanced Enterprise Security

Breadcrumb

  • Home
  • The Role of Identity and Access Management (IAM) in Modern Cybersecurity: Implementing Zero Trust Principles for Enhanced Enterprise Security

Vasu Sunil Kumar Grandhi *

Aujas Cybersecurity, USA.

Research Article

World Journal of Advanced Engineering Technology and Sciences, 2025, 15(03), 179–186

Article DOI: 10.30574/wjaets.2025.15.3.0907

DOI url: https://doi.org/10.30574/wjaets.2025.15.3.0907

Received on 23 April 2025; revised on 30 May 2025; accepted on 02 June 2025

Identity and Access Management (IAM) has emerged as a cornerstone of contemporary cybersecurity strategy, providing organizations with sophisticated frameworks to control and monitor digital resource access across increasingly complex technology environments. This comprehensive article examines how leading IAM solutions, including ForgeRock, Okta, and Microsoft Azure AD are enabling enterprises to implement critical security capabilities such as risk-based authentication, role-based access control, and identity federation. As organizations continue to embrace digital transformation initiatives and distributed workforce models, the integration of IAM with Zero Trust Architecture principles represents a pivotal evolution in security thinking, shifting from perimeter-based defenses to continuous verification of identity and context. The article explores implementation considerations, best practices, and emerging trends that security professionals should evaluate when developing robust IAM strategies to protect sensitive systems and data against evolving threats.

Identity and Access Management; Zero Trust Architecture; Risk-Based Authentication; Role-Based Access Control; Identity Federation

https://wjaets.com/sites/default/files/fulltext_pdf/WJAETS-2025-0907.pdf

Preview Article PDF

Vasu Sunil Kumar Grandhi. The Role of Identity and Access Management (IAM) in Modern Cybersecurity: Implementing Zero Trust Principles for Enhanced Enterprise Security. World Journal of Advanced Engineering Technology and Sciences, 2025, 15(03), 179–186. Article DOI: https://doi.org/10.30574/wjaets.2025.15.3.0907.

Get Certificates

Get Publication Certificate

Download LoA

Check Corssref DOI details

Issue details

Issue Cover Page

Editorial Board

Table of content


Copyright © Author(s). All rights reserved. This article is published under the terms of the Creative Commons Attribution 4.0 International License (CC BY 4.0), which permits use, sharing, adaptation, distribution, and reproduction in any medium or format, as long as appropriate credit is given to the original author(s) and source, a link to the license is provided, and any changes made are indicated.


Copyright © 2026 World Journal of Advanced Engineering Technology and Sciences

Developed & Designed by VS Infosolution