Research and Innovations in Identity and Access Management: Emerging Paradigms for Financial Services

Authors

  • Suneel Kumar Rawat

DOI:

https://doi.org/10.22399/ijcesen.4995

Keywords:

Identity and Access Management, Zero Trust Architecture, Behavioral Biometrics, Machine Identity Governance, Decentralized Identity

Abstract

Identity and Access Management has undergone a foundational architecture shift, based on the convergence of artificial intelligence, Zero Trust, and decentralized identity. Perimeter-based identity governance approaches, with static role provisioning and periodic access review, are structurally inadequate for the identity surfaces that modern financial enterprises operate today. Human users, service accounts, APIs, containerized workloads, and autonomous agents require context-sensitive, always-on access controls that run at a speed and granularity that existing access control and identity management technologies cannot accommodate. Seven innovation domains are changing the landscape of access control and identity management. Agentic artificial intelligence shifts access governance from reaction to prediction. Continuous behavioral authentication reduces implicit session trust. Just-in-time privilege reduces time of access to only what is needed to perform a task, while blockchain-anchored decentralized identity enables privacy-preserving credential verification. Machine identity governance extends least-privilege access to non-human identities. Platform convergence unifies fragmented access governance. Compliance frameworks require machine-speed policy enforcement. The financial services sector, with its heavily regulated environment, high-value targets, and desire for frictionless access experiences, serves as an unmatched proving ground for the approaches presented here. Some of the key open research questions are explainability for regulated decision trails, quantum-resistant crypto, privacy-preserving federated learning, and the measurement of return on investment.

References

[1] Ahmad Ismail et al., "Mapping One Decade of Identity Studies: A Comprehensive Bibliometric Analysis of Global Trends and Scholarly Impact," MDPI, 2025. [Online]. Available: https://www.mdpi.com/2076-0760/14/2/92

[2] SecurityScorecard, "IAM in 2025: Identity and Access Management Best Practices," 2025. [Online]. Available: https://securityscorecard.com/blog/iam-in-2025-identity-and-access-management-best-practices/

[3] Tajammul Pangarkar, "Identity and Access Management Statistics By Security," Market.us Scoop, 2006. [Online]. Available: https://scoop.market.us/identity-and-access-management-statistics/

[4] Mary Marshall, "What is Identity and Access Management (IAM)? Complete 2025-2026 Guide for Enterprise Security," Avatier, 2025. [Online]. Available: https://www.avatier.com/blog/iam-complete-guide-for-enterprise-security/

[5] Mohammed Abuhamad et al., "Sensor-based Continuous Authentication of Smartphones’ Users Using Behavioral Biometrics: A Contemporary Survey," arXiv, 2020. [Online]. Available: https://arxiv.org/pdf/2001.08578

[6] Shrooq Alshomrani and Shancang Li, "PUFDCA: A Zero-Trust-Based IoT Device Continuous Authentication Protocol," Wireless Communications and Mobile Computing Volume 2022, DOI: https://doi.org/10.1155/2022/6367579 [Online] Available: https://onlinelibrary.wiley.com/doi/pdf/10.1155/2022/6367579

[7] Matt Miller, "Just-In-Time Privileged Access Management (JIT PAM): The Missing Piece to Achieving 'True' Least Privilege & Maximum Risk Reduction," BeyondTrust, 2019. [Online]. Available: https://www.beyondtrust.com/blog/entry/just-in-time-privileged-access-management-jit-pam-the-missing-piece-to-achieving-true-least-privilege-maximum-risk-reduction

[8] Seyed Mohammad Hosseini et al., "Blockchain-Based Decentralized Identification in IoT: An Overview of Existing Frameworks and Their Limitations," MDPI, 2023. [Online]. Available: https://www.mdpi.com/2079-9292/12/6/1283

[9] Apono, "Machine Identity Management: How to Discover, Manage, and Secure," 2025. [Online]. Available: https://www.apono.io/blog/machine-identity-management/

[10] Identity Management Institute, "Quantum Threats to Identity and Access Management." [Online]. Available: https://identitymanagementinstitute.org/quantum-threats-to-identity-and-access-management/

Downloads

Published

2026-03-05

How to Cite

Suneel Kumar Rawat. (2026). Research and Innovations in Identity and Access Management: Emerging Paradigms for Financial Services. International Journal of Computational and Experimental Science and Engineering, 12(1). https://doi.org/10.22399/ijcesen.4995

Issue

Section

Research Article