Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats

  • Pushpendra Kumar Verma
    Associate Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001 dr.pkverma81[at]gmail.com
  • Bharat Singh
    Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001
  • Preety
    Assistant Professor, FMC, Swami Vivekanad Subharti University, Uttar Pradesh, India, 250002
  • Shubham Kumar Sharma
    Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001
  • Rakesh Prasad Joshi
    Assistant Professor, School of Computer Science Applications, IIMT University, Uttar Pradesh, India, 250001

Abstract

As a paradigm shift in network security, the idea of Zero Trust Architecture has attracted a lot of attention recently. This study intends to investigate the assessment and application of Zero Trust Architecture in business networks. Network segmentation, continuous authentication, least privilege access, and micro-segmentation are some of the basic ideas and elements of Zero Trust Architecture that are covered in this research. By taking a comprehensive approach to network security, the study evaluates how well Zero Trust Architecture mitigates security risks and shrinks the attack surface. It looks into the difficulties and factors to be taken into account when adopting Zero Trust Architecture, including scalability, user experience, and operational complexity. To shed light on the real-world application of Zero Trust Architecture, the paper also investigates empirical data and case studies from real-world scenarios. The influence of Zero Trust Architecture on operational processes and network performance are also be covered, along with recommended practices and various deployment strategies. Additionally, the research assesses how well Zero Trust Architecture conforms to regulatory standards, compliance needs, and existing security frameworks. The results of this study help us comprehend Zero Trust Architecture and its possible advantages and disadvantages. By offering a thorough evaluation framework and useful suggestions for effective implementation, it is helpful to organizations looking to adopt Zero Trust Architecture. The study's findings add to the corpus of information on Zero Trust Architecture and its role in strengthening network security in the face of evolving cyber threats.
  • Referencias
  • Cómo citar
  • Del mismo autor
  • Métricas
Anderson, R., & Schneier, B. (2019). The science of security. Computer Science Review, 31, 119-120.

Bajwa, I. S., & Sandhu, R. (2020). Zero Trust security model for cloud-based enterprise systems. In 2020 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech) (pp. 33-37). IEEE.

Ciscar, J. J., & Koç, Ç. K. (2020). A survey of zero trust network access models. En 2020 International Conference on Information Networking (ICOIN) (pp. 38-43). IEEE. https://doi.org/10.1109/ICOIN48656.2020.9016518

Dixit, V., Varadharajan, V., Tupakula, U., & Nepal, S. (2019). A survey of security frameworks in cloud computing. Journal of Network and Computer Applications, 133, 56-81.

McBride, S., & Early, A. (2021). Implementing Zero Trust Security in Industrial Control Systems. Journal of Industrial Cybersecurity, 10(3), 45-62.

Gupta, R., Gopalakrishnan, N., & Ahamad, M. (2020). A review of Zero Trust Network Access solutions. Journal of Network Security, 15(3), 207-225.

Gilman, E., & Barth, D. (2017). Zero Trust Networks: Building Secure Systems in Untrusted Networks. O'Reilly Media.

Mohrehkesh, S., Tokuta, A. O., & Gu, G. (2017). Evaluation of a Zero Trust Architecture for secure mobile ad-hoc networks. Journal of Network and Computer Applications, 85, 21-33. https://doi.org/10.1016/j.jnca.2017.01.014

Jerichow, A., Krüger, I., & Bielova, N. (2019). Zero Trust Architecture: Security challenges and risk mitigation approaches. In 2019 14th International Conference on Availability, Reliability and Security (ARES) (pp. 1-6). IEEE.

Johnson, C., & More, J. (2020). Zero Trust Architecture. In The Cloud Adoption Playbook (pp. 189-209). Wiley.

Kaufman, P., & Madjid, T. (2019). Implementing Zero Trust in the enterprise. O'Reilly Media.

Khera, S., & Shrivastava, A. (2020). Implementing Zero Trust Security Model in enterprise networks. International Journal of Research in Computer Science, 10(1), 32-38.

National Institute of Standards and Technology (NIST). (2020). Draft NIST Special Publication 800-207: Zero Trust Architecture. https://csrc.nist.gov/publications/detail/sp/800-207/draft

Okumura, Y., Ohsita, Y., & Sakamoto, N. (2019). Zero Trust security for cloud-native applications. In 2019 IEEE World Congress on Services (SERVICES) (pp. 19-24). IEEE.

Palo Alto Networks. (2020). The CISO's guide to Zero Trust security. https://www.paloaltonetworks.com/resources/whitepapers/the-cisos-guide-to-zero-trust-security

Puri, S., & Joshi, S. (2019). Zero Trust Architecture: A comprehensive analysis. In 2019 International Conference on Cyberlaw, Cybercrime & Cybersecurity (ICCCC) (pp. 1-6). IEEE.

Ristic, I. (2020). Zero Trust Networks. O'Reilly Media.

Saini, A., & Saini, M. (2021). A review on Zero Trust Architecture and its implementation challenges. In 2021 International Conference on Automation, Computational and Technology Management (ICACTM) (pp. 124-128). IEEE.

Sans Institute. (2021). Implementing Zero Trust Networks. https://www.sans.org/reading-room/whitepapers/cloud/implementing-zero-trust-networks-40385

Shahbazian, A., & Wong, E. (2019). Zero Trust: The evolution of enterprise network security architecture. In 2019 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM) (pp. 1-6). IEEE.

Shahzad, M., Hussain, R., Zaidi, S. M. R., & Almogren, A. (2021). Zero Trust Architecture: A comprehensive review. Future Internet, 13(2), 39. https://doi.org/10.3390/fi13020039

The MITRE Corporation. (2020). Zero Trust Architecture (ZTA) Use Case: Remote Access. https://resources.sei.cmu.edu/asset_files/Presentation/2020_017_001_634885.pdf

Tyma, A., & Tyma, P. (2020). Implementing Zero Trust security architecture: A case study. In 2020 IEEE International Symposium on Electromagnetic Compatibility & Signal/Power Integrity (EMCSI) (pp. 1-5). IEEE.

Verma, P. K., Pathak, P., Kumar, B., Himani, H., & Preety, P. (2023). Automatic optical imaging system for mango fruit using hyperspectral camera and deep learning algorithm. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5s), 112-117. https://doi.org/10.17762/ijritcc.v11i5s.6635
Verma, P. K., Singh, B., Preety, Sharma, S. K., & Prasad Joshi, R. (2024). Evaluating the Effectiveness of Zero Trust Architecture in Protecting Against Advanced Persistent Threats. ADCAIJ: Advances in Distributed Computing and Artificial Intelligence Journal, 13(1), e31611. https://doi.org/10.14201/adcaij.31611

Downloads

Download data is not yet available.
+