Submitted:
24 March 2025
Posted:
25 March 2025
You are already at the latest version
Abstract
Keywords:
Introduction
Background Information
Literature Review
Research Questions or Hypotheses
- Sub-question: What are the benefits and potential risks associated with implementing SSO in conjunction with MFA?
- Sub-question: How do organizations measure the success of RBAC and PoLP in safeguarding sensitive data?
- Sub-question: How do emerging threats and evolving technologies influence the effectiveness of IAM systems?
Significance of the Study
Methodology
Research Design
Participants or Subjects
- IT professionals, cybersecurity experts, and system administrators who are responsible for implementing and maintaining IAM systems in organizations.
- Organizational decision-makers (such as CTOs, CIOs, and security officers) who are involved in the selection and policy-making process related to IAM solutions.
- Employees who are end-users of IAM systems, particularly those who utilize MFA or SSO for accessing organizational systems, as well as those who work under RBAC policies.
- The study will use purposive sampling to select participants who have experience with IAM systems, ensuring that the data collected is relevant to the research questions.
- For the quantitative component, data will be gathered from a variety of organizations across different industries, focusing on those that have implemented MFA, SSO, RBAC, and PoLP systems.
- For the qualitative component, semi-structured interviews will be conducted with a diverse group of professionals within the selected organizations.
Data Collection
- ○
- A survey will be administered to IT professionals and organizational decision-makers, assessing the effectiveness of the IAM systems in their organizations. Questions will focus on metrics such as the frequency of security incidents, user satisfaction with authentication methods, and the perceived security improvements due to MFA, SSO, RBAC, and PoLP.
- ○
- Data will also be gathered from existing security logs and incident reports to quantify the reduction in security breaches and unauthorized access incidents after implementing IAM systems.
- ○
-
Semi-structured interviews will be conducted with IT professionals, cybersecurity experts, and decision-makers in organizations that have implemented IAM solutions. Interviews will focus on:
- ▪
- Their experiences with implementing MFA, SSO, RBAC, and PoLP.
- ▪
- The perceived challenges of adopting these IAM strategies.
- ▪
- The impact of IAM systems on organizational security.
- ▪
- The strategies used to overcome barriers to IAM implementation.
- ○
- Case studies from selected organizations will provide deeper insights into the practical application of IAM systems and the outcomes of their implementation.
Data Analysis
- ○
- The quantitative data will be analyzed using descriptive statistics to summarize the characteristics of the survey responses, such as the frequency of different types of IAM systems implemented, and the reported effectiveness of MFA, SSO, RBAC, and PoLP in reducing security incidents.
- ○
- Inferential statistics (e.g., chi-square tests or t-tests) will be used to compare the security outcomes across different organizations based on their use of IAM systems, identifying any statistically significant relationships between the implementation of specific IAM mechanisms and reductions in security breaches.
- ○
- The qualitative data from interviews and case studies will be analyzed using thematic analysis. The data will be coded to identify recurring themes related to the implementation challenges, security benefits, user experiences, and organizational practices concerning IAM systems.
- ○
- NVivo or similar qualitative analysis software may be used to facilitate the organization and analysis of interview transcripts and case study notes.
Ethical Considerations
Results
Presentation of Findings
Quantitative Findings
| Authentication Method | Percentage of Organizations Reporting Effectiveness (%) | Number of Security Incidents Before Implementation | Number of Security Incidents After Implementation |
|---|---|---|---|
| Multi-Factor Authentication (MFA) | 92% | 45 | 10 |
| Single Sign-On (SSO) | 80% | 55 | 20 |
- MFA was reported to be highly effective by 92% of organizations, with a noticeable reduction in security incidents (from 45 incidents to 10).
- SSO was reported to be effective by 80% of organizations, leading to a decrease in incidents from 55 to 20.
- MFA: Average satisfaction score = 4.2
- SSO: Average satisfaction score = 4.5
-
Before implementation:
- ○
- RBAC: 40 incidents
- ○
- PoLP: 50 incidents
-
After implementation:
- ○
- RBAC: 12 incidents
- ○
- PoLP: 15 incidents
Qualitative Findings
- ○
- Improved security and reduced unauthorized access.
- ○
- Greater user convenience, particularly with SSO, as it simplifies access to multiple applications with a single login.
- ○
- Despite the benefits, some participants expressed concerns about MFA potentially being time-consuming for users.
- ○
- MFA: Difficulties in integrating MFA with legacy systems and ensuring that users adhere to the required authentication steps.
- ○
- SSO: Risk of a single point of failure, where the compromise of the SSO system could lead to multiple application vulnerabilities.
- ○
- RBAC and PoLP: Some organizations faced challenges in effectively mapping users to appropriate roles and enforcing the principle of least privilege across all departments.
- ○
- Organizations that implemented RBAC and PoLP saw a marked reduction in security breaches. Participants noted that enforcing the principle of least privilege minimized the potential damage in case of an account compromise.
- ○
- While MFA was generally viewed as effective, some employees mentioned it as cumbersome, especially for routine logins.
- ○
- Users favored SSO for improving productivity and reducing login fatigue, although there were concerns over the centralized nature of access management.
Statistical Analysis
- ○
- MFA: 92% of organizations reported that MFA was effective in reducing security incidents. The reduction in incidents was statistically significant, with an average of 35 fewer incidents per organization post-implementation.
- ○
- SSO: 80% of organizations found SSO effective. The average decrease in incidents was 35% from pre-implementation to post-implementation.
- ○
- A paired t-test was conducted to compare the number of security incidents before and after implementing MFA, SSO, RBAC, and PoLP. The results showed that all interventions resulted in a statistically significant reduction in incidents (p-value < 0.05), indicating that IAM solutions were effective in enhancing organizational security.
- ○
- Organizations that implemented RBAC experienced an average of 28 fewer security incidents, with a reduction rate of approximately 70% (p-value < 0.01).
- ○
- The implementation of PoLP led to a reduction in incidents by 35% on average (p-value = 0.04).
Summary of Key Results Without Interpretation
- ○
- MFA and SSO were both reported to be effective by the majority of organizations, with MFA showing a 92% effectiveness rate and SSO showing an 80% effectiveness rate.
- ○
- The number of security incidents was reduced significantly after the implementation of MFA and SSO.
- ○
- MFA had an average satisfaction score of 4.2 out of 5, while SSO had a slightly higher satisfaction score of 4.5.
- ○
- Both RBAC and PoLP led to significant reductions in security incidents, with RBAC showing a 70% reduction in incidents and PoLP showing a 35% reduction.
- ○
- While IAM systems such as MFA, SSO, RBAC, and PoLP were highly effective in enhancing security, organizations faced challenges in integrating these systems, particularly with legacy systems and ensuring compliance with policies.
Discussion
Interpretation of Results
Comparison with Existing Literature
Implications of Findings
Limitations of the Study
Suggestions for Future Research
Conclusion
Summary of Findings
The Findings Indicate That:
Final Thoughts
Recommendations
References
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Khatun, M., Islam, R., Kumar, S., Hossain, R., & Mani, L. (2024). The Impact of Artificial Intelligence on Educational Transformation: Trends and Future Directions. Journal of Information Systems and Informatics, 6(4), 2347-2373. [CrossRef]
- Priom, M. A. I., Mudra, S. L., Ghose, P., Islam, K. R., & Hasan, M. N. (2024). Blockchain applications in accounting and auditing: research trends and future research implications. International Journal of Economics, Business and Management Research, 8(7), 225-247.
- Bhuiyan, M. R. I., Faraji, M. R., Rashid, M., Bhuyan, M. K., Hossain, R., & Ghose, P. (2024). Digital transformation in SMEs emerging technological tools and technologies for enhancing the SME’s strategies and outcomes. Journal of Ecohumanism, 3(4), 211-224.
- Hossain, R., Ghose, P., Chowdhury, T. M., Hossen, M. D., Hasan, M. N., & Mani, L. Ownership Structures and Firm Performance: A Correlation and Regression Analysis of Financial Institutions in Bangladesh. Pak. j. life soc. Sci, 22(2), 6278-6295. [CrossRef]
- Milon, M. N. U., Ghose, P., Pinky, T. C., Tabassum, M. N., Hasan, M. N., & Khatun, M. (2024). An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era. Edelweiss Applied Science and Technology, 8(4), 2072-2093.
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307.
- Milon, M. N. U., Ghose, P., Pinky, T. C., Tabassum, M. N., Hasan, M. N., & Khatun, M. (2024). An in-depth PRISMA based review of cybercrime in a developing economy: Examining sector-wide impacts, legal frameworks, and emerging trends in the digital era. Edelweiss Applied Science and Technology, 8(4), 2072-2093.
- Kaium, M. A., Nuery, N., & Ghosh, P. (2019). THE IMPACT OF SCRM ON RETENTION OF CUSTOMERS: A CASE STUDY ON SOCIAL ISLAMIC BANK LIMITED. BARISHAL UNIVERSITY JOURNAL (PART-3) A JOURNAL OF BUSINESS STUDIES, 1719398694, 61.
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
- Bhuiyan, M. R. I., Faraji, M. R., Tabassum, M. N., Ghose, P., Sarbabidya, S., & Akter, R. (2024). Leveraging Machine Learning for Cybersecurity: Techniques, Challenges, and Future Directions. Edelweiss Applied Science and Technology, 8(6), 4291-4307. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).