As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.
As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.
Primary Language | English |
---|---|
Subjects | Software Engineering (Other) |
Journal Section | Research Article |
Authors | |
Publication Date | December 30, 2024 |
Submission Date | September 26, 2024 |
Acceptance Date | November 10, 2024 |
Published in Issue | Year 2024 Volume: 8 Issue: 3 |
International Journal of 3D Printing Technologies and Digital Industry is lisenced under Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı