As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.
Authentication Cyber Security Industry 5.0 Network Architecture Zero Trust
As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.
Authentication Cyber Security Industry 5.0 Network Architecture Zero Trust.
Birincil Dil | İngilizce |
---|---|
Konular | Yazılım Mühendisliği (Diğer) |
Bölüm | Araştırma Makalesi |
Yazarlar | |
Yayımlanma Tarihi | 30 Aralık 2024 |
Gönderilme Tarihi | 26 Eylül 2024 |
Kabul Tarihi | 10 Kasım 2024 |
Yayımlandığı Sayı | Yıl 2024 Cilt: 8 Sayı: 3 |
Uluslararası 3B Yazıcı Teknolojileri ve Dijital Endüstri Dergisi Creative Commons Atıf-GayriTicari 4.0 Uluslararası Lisansı ile lisanslanmıştır.