International Journal of Leading Research Publication
E-ISSN: 2582-8010
•
Impact Factor: 9.56
A Widely Indexed Open Access Peer Reviewed Multidisciplinary Monthly Scholarly International Journal
Plagiarism is checked by the leading plagiarism checker
Call for Paper
Volume 7 Issue 4
April 2026
Indexing Partners
Security-as-Code: Automating Identity Governance in Zero Trust Cloud Architectures
| Author(s) | Ebubechukwu Edokwe |
|---|---|
| Country | United States |
| Abstract | In an ever-changing landscape of cyber threats that in complexity, organizations need varying paradigms for security to defend their digital worlds. Zero Trust Architecture (ZTA) has become a top architecture for a cloud security and is fundamentally changing the way traditionally authentication, authorization and access to the network is applied. A critical component to ZTA is Identity Governance - providing only authorized users and devices access to critical resources. However, the Internet and robustness of connecting and interacting through it are in its dynamic and expected and changing nature of the cloud environment poses challenges in effective management of identities, who whenever, and how do to accept. This is where the Security-as-Code (SaC) comes into the picture. An open solution for automatically securing the identities is Security-as-Code (SaC), a new way to include security policies in the software development lifecycle. Through the use of tools like Infrastructure-as-Code (IaC), allowing SaC, it's possible to continuously enforce access controls to ensure that security policies are continuously applied in and applied in real time. This paper looks at how SaC can help simplify the identity governance processes as part of Zero Trust cloud architectures, and improve both the security and compliance elements. It talks about the benefits of automation such as the lessening of human error, scalability and the ability to enforce policy faster. Additionally, the article covers the challenges organizations face when incorporating SaC into their existing workflows and systems and best practices for successful implementation. This paper additionally highlights the way the conjunction of Identity and Access Management (IAM) frameworks and SaC make a complete security and compliance in dynamic cloud utilizing environments. The findings show that SaC is a robust and automated solution to the problem of identity governance in Zero Trust architectures and can lead to enhanced operational efficiency and increased security posture of cloud native infrastructures. |
| Keywords | Security-as-Code (SaC), Identity Governance, Zero Trust Architecture (ZTA), Cloud Security, Infrastructure-as-Code (IaC), Identity and Access Management (IAM), Cloud Automation, Risk Mitigation. |
| Published In | Volume 6, Issue 12, December 2025 |
| Published On | 2025-12-23 |
Share this

CrossRef DOI is assigned to each research paper published in our journal.
IJLRP DOI prefix is
10.70528/IJLRP
Downloads
All research papers published on this website are licensed under Creative Commons Attribution-ShareAlike 4.0 International License, and all rights belong to their respective authors/researchers.