Research Article
BibTex RIS Cite

THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE

Year 2024, Volume: 8 Issue: 3, 416 - 427, 30.12.2024
https://doi.org/10.46519/ij3dptdi.1556319

Abstract

As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.

References

  • 1. Karabacak, B., "Kritik altyapılara yönelik siber tehditler ve Türkiye için siber güvenlik önerileri," Siber Güvenlik Çalıştayı, Bilgi Güvenliği Derneği, Ankara, Vol. 29, Pages 1-11, 2011.
  • 2. Topcu, N., "Siber güvenlik: tehditler ve çözüm yolları," Cyberpolitik Journal, Vol. 6, Issue 12, Pages 155-181, 2021.
  • 3. Thakur, K., Qiu, M., Gai, K., & Ali, M. L., "An investigation on cyber security threats and security models," IEEE 2nd International Conference on Cyber Security and Cloud Computing, Pages 307-311, November 2015.
  • 4. He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X., "A survey on zero trust architecture: Challenges and future trends," Wireless Communications and Mobile Computing, Vol. 2022, Issue 1, Article 6476274, 2022.
  • 5. Bertino, E., "Zero trust architecture: does it help?" IEEE Security & Privacy, Vol. 19, Issue 5, Pages 95-96, 2021.
  • 6. Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R., "Zero trust architecture (ZTA): A comprehensive survey," IEEE Access, Vol. 10, Pages 57143-57179, 2022.
  • 7. Czeczot, G., Rojek, I., Mikołajewski, D., & Sangho, B. (2023). AI in IIoT management of cybersecurity for industry 4.0 and industry 5.0 purposes. Electronics, Vol. 12, Issue 18,Pages 3800.
  • 8. Trivedi, C., Bhattacharya, P., Prasad, V. K., Patel, V., Singh, A., Tanwar, S., ... & Sharma, G. (2024). Explainable AI for Industry 5.0: Vision, Architecture, and Potential Directions. IEEE Open Journal of Industry Applications.
  • 9. D'Silva, D., & Ambawade, D. D., "Building a zero trust architecture using kubernetes," 2021 6th International Conference for Convergence in Technology (I2CT), Pages 1-8, April 2021.
  • 10. Stafford, V., "Zero trust architecture," NIST Special Publication, Vol. 800, Issue 207, 2020.
  • 11. Greenwood, D., "Applying the principles of zero-trust architecture to protect sensitive and critical data," Network Security, Vol. 2021, Issue 6, Pages 7-9, 2021.
  • 12. Fernandez, E. B., & Brazhuk, A., "A critical analysis of Zero Trust Architecture (ZTA)," Computer Standards & Interfaces, Vol. 89, Article 103832, 2024.
  • 13. Edo, O. C., Tenebe, T., Etu, E. E., Ayuwu, A., Emakhu, J., & Adebiyi, S., "Zero Trust Architecture: Trend and Impact on Information Security," International Journal of Emerging Technology and Advanced Engineering, Vol. 12, Issue 7, Page 140, 2022.
  • 14. Seaman, J., "Zero trust security strategies and guidelines," in Digital Transformation in Policing: The Promise, Perils and Solutions, Cham: Springer International Publishing, Pages 149-168, 2023.
  • 15. Greenwood, D., "Applying the principles of zero-trust architecture to protect sensitive and critical data," Network Security, Vol. 2021, Issue 6, Pages 7-9, 2021.
  • 16. Edo, O. C., Tenebe, T., Etu, E. E., Ayuwu, A., Emakhu, J., & Adebiyi, S., "Zero Trust Architecture: Trend and Impact on Information Security," International Journal of Emerging Technology and Advanced Engineering, Vol. 12, Issue 7, Page 140, 2022.
  • 17. He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X., "A survey on zero trust architecture: Challenges and future trends," Wireless Communications and Mobile Computing, Vol. 2022, Issue 1, Article 6476274, 2022.
  • 18. Ahmadi, S., "Zero trust architecture in cloud networks: Application, challenges and future opportunities," Journal of Engineering Research and Reports, Vol. 26, Issue 2, Pages 215-228, 2024.
  • 19. Qazi, F. A., "Study of zero trust architecture for applications and network security," 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Pages 111-116, December 2022.
  • 20. Damaraju, A., "Implementing Zero Trust Architecture in Modern Cyber Defense Strategies," Unique Endeavor in Business & Social Sciences, Vol. 3, Issue 1, Pages 173-188, 2024.
  • 21. Alevizos, L., Ta, V. T., & Hashem Eiza, M., "Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review," Security and Privacy, Vol. 5, Issue 1, Article e191, 2022.
  • 22. Gupta, A., Gupta, P., Pandey, U. P., Kushwaha, P., Lohani, B. P., & Bhati, K., "ZTSA: Zero Trust Security Architecture a Comprehensive Survey," 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), Pages 378-383, May 2024.
  • 23. Liu, H., Ai, M., Huang, R., Qiu, R., & Li, Y., "Identity authentication for edge devices based on zero-trust architecture," Concurrency and Computation: Practice and Experience, Vol. 34, Issue 23, Article e7198, 2022.

THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE

Year 2024, Volume: 8 Issue: 3, 416 - 427, 30.12.2024
https://doi.org/10.46519/ij3dptdi.1556319

Abstract

As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.

References

  • 1. Karabacak, B., "Kritik altyapılara yönelik siber tehditler ve Türkiye için siber güvenlik önerileri," Siber Güvenlik Çalıştayı, Bilgi Güvenliği Derneği, Ankara, Vol. 29, Pages 1-11, 2011.
  • 2. Topcu, N., "Siber güvenlik: tehditler ve çözüm yolları," Cyberpolitik Journal, Vol. 6, Issue 12, Pages 155-181, 2021.
  • 3. Thakur, K., Qiu, M., Gai, K., & Ali, M. L., "An investigation on cyber security threats and security models," IEEE 2nd International Conference on Cyber Security and Cloud Computing, Pages 307-311, November 2015.
  • 4. He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X., "A survey on zero trust architecture: Challenges and future trends," Wireless Communications and Mobile Computing, Vol. 2022, Issue 1, Article 6476274, 2022.
  • 5. Bertino, E., "Zero trust architecture: does it help?" IEEE Security & Privacy, Vol. 19, Issue 5, Pages 95-96, 2021.
  • 6. Syed, N. F., Shah, S. W., Shaghaghi, A., Anwar, A., Baig, Z., & Doss, R., "Zero trust architecture (ZTA): A comprehensive survey," IEEE Access, Vol. 10, Pages 57143-57179, 2022.
  • 7. Czeczot, G., Rojek, I., Mikołajewski, D., & Sangho, B. (2023). AI in IIoT management of cybersecurity for industry 4.0 and industry 5.0 purposes. Electronics, Vol. 12, Issue 18,Pages 3800.
  • 8. Trivedi, C., Bhattacharya, P., Prasad, V. K., Patel, V., Singh, A., Tanwar, S., ... & Sharma, G. (2024). Explainable AI for Industry 5.0: Vision, Architecture, and Potential Directions. IEEE Open Journal of Industry Applications.
  • 9. D'Silva, D., & Ambawade, D. D., "Building a zero trust architecture using kubernetes," 2021 6th International Conference for Convergence in Technology (I2CT), Pages 1-8, April 2021.
  • 10. Stafford, V., "Zero trust architecture," NIST Special Publication, Vol. 800, Issue 207, 2020.
  • 11. Greenwood, D., "Applying the principles of zero-trust architecture to protect sensitive and critical data," Network Security, Vol. 2021, Issue 6, Pages 7-9, 2021.
  • 12. Fernandez, E. B., & Brazhuk, A., "A critical analysis of Zero Trust Architecture (ZTA)," Computer Standards & Interfaces, Vol. 89, Article 103832, 2024.
  • 13. Edo, O. C., Tenebe, T., Etu, E. E., Ayuwu, A., Emakhu, J., & Adebiyi, S., "Zero Trust Architecture: Trend and Impact on Information Security," International Journal of Emerging Technology and Advanced Engineering, Vol. 12, Issue 7, Page 140, 2022.
  • 14. Seaman, J., "Zero trust security strategies and guidelines," in Digital Transformation in Policing: The Promise, Perils and Solutions, Cham: Springer International Publishing, Pages 149-168, 2023.
  • 15. Greenwood, D., "Applying the principles of zero-trust architecture to protect sensitive and critical data," Network Security, Vol. 2021, Issue 6, Pages 7-9, 2021.
  • 16. Edo, O. C., Tenebe, T., Etu, E. E., Ayuwu, A., Emakhu, J., & Adebiyi, S., "Zero Trust Architecture: Trend and Impact on Information Security," International Journal of Emerging Technology and Advanced Engineering, Vol. 12, Issue 7, Page 140, 2022.
  • 17. He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X., "A survey on zero trust architecture: Challenges and future trends," Wireless Communications and Mobile Computing, Vol. 2022, Issue 1, Article 6476274, 2022.
  • 18. Ahmadi, S., "Zero trust architecture in cloud networks: Application, challenges and future opportunities," Journal of Engineering Research and Reports, Vol. 26, Issue 2, Pages 215-228, 2024.
  • 19. Qazi, F. A., "Study of zero trust architecture for applications and network security," 2022 IEEE 19th International Conference on Smart Communities: Improving Quality of Life Using ICT, IoT and AI (HONET), Pages 111-116, December 2022.
  • 20. Damaraju, A., "Implementing Zero Trust Architecture in Modern Cyber Defense Strategies," Unique Endeavor in Business & Social Sciences, Vol. 3, Issue 1, Pages 173-188, 2024.
  • 21. Alevizos, L., Ta, V. T., & Hashem Eiza, M., "Augmenting zero trust architecture to endpoints using blockchain: A state-of-the-art review," Security and Privacy, Vol. 5, Issue 1, Article e191, 2022.
  • 22. Gupta, A., Gupta, P., Pandey, U. P., Kushwaha, P., Lohani, B. P., & Bhati, K., "ZTSA: Zero Trust Security Architecture a Comprehensive Survey," 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), Pages 378-383, May 2024.
  • 23. Liu, H., Ai, M., Huang, R., Qiu, R., & Li, Y., "Identity authentication for edge devices based on zero-trust architecture," Concurrency and Computation: Practice and Experience, Vol. 34, Issue 23, Article e7198, 2022.
There are 23 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Research Article
Authors

Ahmet Ali Süzen 0000-0002-5871-1652

Osman Ceylan 0000-0002-6060-0134

Publication Date December 30, 2024
Submission Date September 26, 2024
Acceptance Date November 10, 2024
Published in Issue Year 2024 Volume: 8 Issue: 3

Cite

APA Süzen, A. A., & Ceylan, O. (2024). THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE. International Journal of 3D Printing Technologies and Digital Industry, 8(3), 416-427. https://doi.org/10.46519/ij3dptdi.1556319
AMA Süzen AA, Ceylan O. THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE. IJ3DPTDI. December 2024;8(3):416-427. doi:10.46519/ij3dptdi.1556319
Chicago Süzen, Ahmet Ali, and Osman Ceylan. “THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE”. International Journal of 3D Printing Technologies and Digital Industry 8, no. 3 (December 2024): 416-27. https://doi.org/10.46519/ij3dptdi.1556319.
EndNote Süzen AA, Ceylan O (December 1, 2024) THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE. International Journal of 3D Printing Technologies and Digital Industry 8 3 416–427.
IEEE A. A. Süzen and O. Ceylan, “THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE”, IJ3DPTDI, vol. 8, no. 3, pp. 416–427, 2024, doi: 10.46519/ij3dptdi.1556319.
ISNAD Süzen, Ahmet Ali - Ceylan, Osman. “THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE”. International Journal of 3D Printing Technologies and Digital Industry 8/3 (December 2024), 416-427. https://doi.org/10.46519/ij3dptdi.1556319.
JAMA Süzen AA, Ceylan O. THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE. IJ3DPTDI. 2024;8:416–427.
MLA Süzen, Ahmet Ali and Osman Ceylan. “THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE”. International Journal of 3D Printing Technologies and Digital Industry, vol. 8, no. 3, 2024, pp. 416-27, doi:10.46519/ij3dptdi.1556319.
Vancouver Süzen AA, Ceylan O. THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE. IJ3DPTDI. 2024;8(3):416-27.

download

International Journal of 3D Printing Technologies and Digital Industry is lisenced under Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı