Industry Perception of Security Challenges with Identity Access Management Solutions

Abhishek Pratap Singh,Ievgeniia Kuzminykh,Bogdan Ghita
2024-08-20
Abstract:Identity Access Management (IAM) is an area posing significant challenges, particularly in the context of remote connectivity and distributed or cloud-based systems. A wide range of technical solutions have been proposed by prior research, but the integration of these solutions in the commercial sector represent steps that significantly hamper their acceptance. The study aims to outline the current perception and security issues associated with IAMs solutions from the perspective of the beneficiaries. The analysis relies on a series of interviews with 45 cyber security professionals from different organisations all over the world. As results showed, cloud IAM solutions and on premises IAM solutions are affected by different issues. The main challenges for cloud based IAM solutions were Default configurations, Poor management of Non-Human Identities such as Service accounts, Poor certificate management, Poor API configuration and limited Log analysis. In contrast, the challenges for on premise solutions were Multi Factor Authentication, insecure Default configurations, Lack of skillsets required to manage IAM solution securely, Poor password policies, Unpatched vulnerabilities, and compromise of Single-Sign on leading to compromise of multiple entities. The study also determined that, regardless the evolving functionality of cloud based IAM solutions, 41% of respondents believe that the on premise solutions more secure than the cloud-based ones. As pointed out by the respondents, cloud IAM may potentially expose organisations to a wider range of vulnerabilities due to the complexity of the underlying solutions, challenges with managing permissions, and compliance to dynamic IAM policies.
Cryptography and Security
What problem does this paper attempt to address?
The problems that this paper attempts to solve are: **Security challenges and perception issues of Identity Access Management (IAM) solutions in business applications, especially in remote - connected, distributed or cloud - based systems.** Specifically, the paper aims to explore the following two main issues: 1. **What are the key challenges and vulnerabilities of IAM solutions in cloud environments and on - premise deployment environments?** - The paper conducts a detailed analysis of the different security challenges faced by cloud IAM and on - premise IAM solutions by interviewing 45 cybersecurity professionals from different organizations around the world. - For cloud IAM solutions, the main challenges include improper default configurations, poor management of non - human identities (such as service accounts), weak certificate management, poor API configurations, and insufficient log analysis. - For on - premise IAM solutions, the main challenges include lack of multi - factor authentication, insecure default configurations, lack of skills required to manage IAM solutions, weak password policies, unpatched vulnerabilities, and multiple entities being exposed due to a single - sign - on (SSO) breach. 2. **Which deployment model, cloud IAM or on - premise IAM, is more secure?** - The survey results show that while 41% of the respondents believe that on - premise IAM solutions are more secure, 53.4% of the respondents believe that cloud IAM solutions are more secure. - This divergence reflects the complexity and uncertainty that enterprises face when choosing an IAM deployment model, especially when it becomes more difficult to manage and track the identities of multiple applications in a multi - cloud environment. Through the research of these issues, the paper hopes to provide the industry with in - depth insights into the security and practical applications of IAM solutions and reveal their potential vulnerabilities and security challenges.