- International Journal of 3D Printing Technologies and Digital Industry
- Volume:8 Issue:3
- THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION ...
THE ADVANTAGES AND IMPLEMENTATION CHALLENGES WITHIN THE SCOPE OF THE BASIC PRINCIPLES OF TRANSITION TO ZERO TRUST ARCHITECTURE
Authors : Ahmet Ali Süzen, Osman Ceylan
Pages : 416-427
Doi:10.46519/ij3dptdi.1556319
View : 43 | Download : 69
Publication Date : 2024-12-30
Article Type : Research Paper
Abstract :As the number of people working remotely increases, it is insufficient for organizations to protect the boundaries of their digital networks. To protect these boundaries, organizations need adaptive solutions that perform full authentication, authenticate every access request, and quickly detect and respond to both on- and off-network threats. Within this motivation, zero trust is a next generation security strategy based on the principle of “never trust, always verify”. In this study, the basic principles applied from the transition processes to zero trust architecture are evaluated and the advantages of this architecture to the security scope are examined. At the same time, the challenges that organizations that want to implement zero trust architecture will face in this transition are evaluated. The transition to zero trust architecture requires cumulative serious changes in the IT infrastructure of organizations. Zero trust architecture aims to build a system in which all information assets, users and data flow are constantly labeled as untrustworthy and therefore need to be constantly verified. The successful implementation of the zero-trust approach in organizational structures provides advantages such as dynamic authentication, increased endpoint security and strict control over data flows. However, it is also seen that challenges such as network identity management and data monitoring arise during the transition and implementation of zero trust architecture.Keywords : Authentication, Cyber Security, Industry 5.0, Network Architecture, Zero Trust.