Articles | Open Access | https://doi.org/10.55640/ijiot-05-01-05

AI-Driven Identity and Access Management in Enterprise Systems

Ramanan Hariharan , Principal Engineering Manager, Security and Resiliency, Microsoft, Mountain View, USA

Abstract

Identity and Access Management (IAM) is essential for cybersecurity architecture because of the increasing complexity of the digital enterprise. The research investigates how Artificial Intelligence (AI) transforms Identity and Access Management (IAM) by establishing context-aware systems that function adaptively through automated identity governance capabilities. Concepts from traditional IAM infrastructure face challenges when implementing dynamic access models because they base their function on manual processes and static policies in their design. Machine learning combined with behavioral analytics and orchestration capabilities installed across the entire IAM lifecycle by AI can solve these issues, from authentication procedures to authorization functions and continuing through entitlement governance until policy execution. AI integration establishes continuous authentication with behavioral biometrics and conducts real-time anomaly detection through unsupervised learning models to enable proactive threat mitigation through risk-adaptive access controls. Through AI, the discovery and automation of access rights become possible because systems use actual user activities and organizational settings to refine and certify proper access definitions. The automation systems help organizations comply with GDPR and HIPAA by delivering immediate policy changes while providing auditable access decision logs. The research document evaluates how AI contributes to creating IAM infrastructure that can adapt because it uses predictive load-balancing techniques, self-healing orchestration mechanisms, and autonomous incident response capabilities. The document shows how IAM unites with Security Operations Centers (SOCs) by correlating identity signals with wider security monitoring data to enhance security detection visibility and coordinated response. This report reveals through technical precision and industry examples that AI-driven IAM functions as a security defense system and a business-enabling power for operational speed, compliance adherence, and digital safety in organizational networks. The research highlights AI's critical position in creating security for contemporary identity perimeters.

Keywords

Identity AI, Access Governance, Cyber resilience, AI Security, Identity Management, Access Control

References

Bitar, H., & Jakobsson, B. (2017). Gdpr: Securing personal data in compliance with new eu-regulations.

Bughin, J., Hazan, E., Sree Ramaswamy, P., DC, W., & Chu, M. (2017). Artificial intelligence the next digital frontier.

Chavan, A. (2022). Importance of identifying and establishing context boundaries while migrating from monolith to microservices. Journal of Engineering and Applied Sciences Technology, 4, E168. http://doi.org/10.47363/JEAST/2022(4)E168

Chavan, A. (2024). Fault-tolerant event-driven systems: Techniques and best practices. Journal of Engineering and Applied Sciences Technology, 6, E167. http://doi.org/10.47363/JEAST/2024(6)E167

Chen, R., Sharman, R., Rao, H. R., & Upadhyaya, S. J. (2013). Data model development for fire related extreme events: An activity theory approach. Mis Quarterly, 125-147.

Desmond, B., Richards, J., Allen, R., & Lowe-Norris, A. G. (2008). Active Directory: Designing, Deploying, and Running Active Directory. " O'Reilly Media, Inc.".

Dhanagari, M. R. (2024). Scaling with MongoDB: Solutions for handling big data in real-time. Journal of Computer Science and Technology Studies, 6(5), 246-264. https://doi.org/10.32996/jcsts.2024.6.5.20

Dhayanidhi, G. (2022). Research on IoT threats & implementation of AI/ML to address emerging cybersecurity issues in IoT with cloud computing.

Farroha, B., & Farroha, D. (2012, March). Challenges of “operationalizing” dynamic system access control: Transitioning from ABAC to RAdAC. In 2012 IEEE International Systems Conference SysCon 2012 (pp. 1-7). IEEE.

Flowerday, S., & Von Solms, R. (2005). Real-time information integrity= system integrity+ data integrity+ continuous assurances. Computers & Security, 24(8), 604-613.

Goel, G., &Bhramhabhatt, R. (2024). Dual sourcing strategies. International Journal of Science and Research Archive, 13(2), 2155. https://doi.org/10.30574/ijsra.2024.13.2.2155

Goel, K. (2023). How data analytics techniques can optimize sales territory planning. Journal of Computer Science and Technology Studies, 5(4), 248–264. https://doi.org/10.32996/jcsts.2023.5.4.26

Greenhalgh, T., Wherton, J., Papoutsi, C., Lynch, J., Hughes, G., Hinder, S., ... & Shaw, S. (2017). Beyond adoption: a new framework for theorizing and evaluating nonadoption, abandonment, and challenges to the scale-up, spread, and sustainability of health and care technologies. Journal of medical Internet research, 19(11), e8775.

Hong, C. Y., Caesar, M., Duffield, N., & Wang, J. (2012, June). Tiresias: Online anomaly detection for hierarchical operational network data. In 2012 IEEE 32nd International Conference on Distributed Computing Systems (pp. 173-182). IEEE.

Hossain, K. A. (2023). Analysis of present and future use ofartificial intelligence (ai) in line of fouth industrial revolution (4ir). Scientific Research Journal, 11, 1-50.

Karwa, K. (2023). AI-powered career coaching: Evaluating feedback tools for design students. Indian Journal of Economics & Business. https://www.ashwinanokha.com/ijeb-v22-4-2023.php

Karwa, K. (2024). The future of work for industrial and product designers: Preparing students for AI and automation trends. Identifying the skills and knowledge that will be critical for future-proofing design careers. International Journal of Advanced Research in Engineering and Technology, 15(5). https://iaeme.com/MasterAdmin/Journal_uploads/IJARET/VOLUME_15_ISSUE_5/IJARET_15_05_011.pdf

Katyal, S. K. (2019). Private accountability in the age of artificial intelligence. UCLA L. Rev., 66, 54.

Kayode-Ajala, O. (2023). Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption. Applied Research in Artificial Intelligence and Cloud Computing, 6(8), 1-21.

Konneru, N. M. K. (2021). Integrating security into CI/CD pipelines: A DevSecOps approach with SAST, DAST, and SCA tools. International Journal of Science and Research Archive. Retrieved from https://ijsra.net/content/role-notification-scheduling-improving-patient

Kumar, A. (2019). The convergence of predictive analytics in driving business intelligence and enhancing DevOps efficiency. International Journal of Computational Engineering and Management, 6(6), 118-142. Retrieved from https://ijcem.in/wp-content/uploads/THE-CONVERGENCE-OF-PREDICTIVE-ANALYTICS-IN-DRIVING-BUSINESS-INTELLIGENCE-AND-ENHANCING-DEVOPS-EFFICIENCY.pdf

Kuziemski, M., & Misuraca, G. (2020). AI governance in the public sector: Three tales from the frontiers of automated decision-making in democratic settings. Telecommunications policy, 44(6), 101976.

Long, N., & Thomas, R. (2001). Trends in denial of service attack technology. CERT Coordination Center, 648(651), 569.

Lucchese, C., Nardini, F. M., Perego, R., Tonellotto, N., Orlando, S., & Venturini, R. (2016). fast traversal of Large Ensembles of Regression trees. ERCIM NEWS, (107), 28-29.

Madaio, M. A., Stark, L., Wortman Vaughan, J., & Wallach, H. (2020, April). Co-designing checklists to understand organizational challenges and opportunities around fairness in AI. In Proceedings of the 2020 CHI conference on human factors in computing systems (pp. 1-14).

Madni, S. H. H., Latiff, M. S. A., Coulibaly, Y., & Abdulhamid, S. I. M. (2017). Recent advancements in resource allocation techniques for cloud computing environment: a systematic review. cluster computing, 20, 2489-2533.

Matwin, S., Kouznetsov, A., Inkpen, D., Frunza, O., & O'Blenis, P. (2010). A new algorithm for reducing the workload of experts in performing systematic reviews. Journal of the American Medical Informatics Association, 17(4), 446-453.

Mineraud, J., Mazhelis, O., Su, X., & Tarkoma, S. (2016). A gap analysis of Internet-of-Things platforms. Computer Communications, 89, 5-16.

Mohammed, I. A. (2017). Systematic review of identity access management in information security. International Journal of Innovations in Engineering Research and Technology, 4(7), 1-7.

Munkvold, B. E. (2002). Implementing collaboration technologies in industry: Case examples and lessons learned. Springer Science & Business Media.

Nahar, K., & Gill, A. Q. (2022). Integrated identity and access management metamodel and pattern system for secure enterprise architecture. Data & Knowledge Engineering, 140, 102038.

Nyati, S. (2018). Transforming telematics in fleet management: Innovations in asset tracking, efficiency, and communication. International Journal of Science and Research (IJSR), 7(10), 1804-1810. Retrieved from https://www.ijsr.net/getabstract.php?paperid=SR24203184230

Qian, J., Hinrichs, S., & Nahrstedt, K. (2001). ACLA: A framework for access control list (ACL) analysis and optimization. In Communications and Multimedia Security Issues of the New Century: IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS’01) May 21–22, 2001, Darmstadt, Germany (pp. 197-211). Springer US.

Raju, R. K. (2017). Dynamic memory inference network for natural language inference. International Journal of Science and Research (IJSR), 6(2). https://www.ijsr.net/archive/v6i2/SR24926091431.pdf

Sagiroglu, S., & Sinanc, D. (2013, May). Big data: A review. In 2013 international conference on collaboration technologies and systems (CTS) (pp. 42-47). IEEE.

Sardana, J. (2022). Scalable systems for healthcare communication: A design perspective. International Journal of Science and Research Archive. https://doi.org/10.30574/ijsra.2022.7.2.0253

Shoaib, M. (2016). AI-enabled cyber weapons and implications for cybersecurity. Journal of Strategic Affairs of, 9-37.

Singh, V. (2023). Large language models in visual question answering: Leveraging LLMs to interpret complex questions and generate accurate answers based on visual input. International Journal of Advanced Engineering and Technology (IJAET), 5(S2). https://romanpub.com/resources/Vol%205%20%2C%20No%20S2%20-%2012.pdf

Singh, V. (2024). Ethical considerations in deploying AI systems in public domains: Addressing the ethical challenges of using AI in areas like surveillance and healthcare. Turkish Journal of Computer and Mathematics Education (TURCOMAT). https://turcomat.org/index.php/turkbilmat/article/view/14959

Sukhadiya, J., Pandya, H., & Singh, V. (2018). Comparison of Image Captioning Methods. INTERNATIONAL JOURNAL OF ENGINEERING DEVELOPMENT AND RESEARCH, 6(4), 43-48. https://rjwave.org/ijedr/papers/IJEDR1804011.pdf

Uddin, M., Islam, S., & Al-Nemrat, A. (2019). A dynamic access control model using authorising workflow and task-role-based access control. Ieee Access, 7, 166676-166689.

Usama, M., Qadir, J., Raza, A., Arif, H., Yau, K. L. A., Elkhatib, Y., ... & Al-Fuqaha, A. (2019). Unsupervised machine learning for networking: Techniques, applications and research challenges. IEEE access, 7, 65579-65615.

Zhang, Y., Wang, L., Sun, W., Green II, R. C., & Alam, M. (2011). Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Transactions on Smart Grid, 2(4), 796-808.

Zimmerman, C. (2014). Cybersecurity operations center. The MITRE Corporation.

Article Statistics

Downloads

Download data is not yet available.

Copyright License

Download Citations

How to Cite

AI-Driven Identity and Access Management in Enterprise Systems. (2025). International Journal of IoT, 5(01), 62-94. https://doi.org/10.55640/ijiot-05-01-05