Zero Trust Security Governance by Utilizing Identity and Access Management

Year : 2023 | Volume : 01 | Issue : 02 | Page : 6-18
By

    Sampath Talluri

  1. IAM Lead Engineer, Department of Computer Science, Western Michigan University, Michigan, United States

Abstract

The Zero Trust (ZT) Paradigm, a more stringent approach to network security, operates on the fundamental concept of “Never Assume, Always Authenticate.” It is currently being implemented in different countries to align with their national cybersecurity and access management governance policies. The differentiation of these Zero Trust (ZT) systems is contingent upon factors such as awareness, infrastructure, expenses, and security demand. Additionally, the identity-based access management models within the Zero Trust (ZT) system exhibit variations depending on factors such as user profiles, resource allocations, application domains, the specific ZT rules in place, and the role of the ZT administrator. The aforementioned disparities contribute to the phenomenon of security fragmentation, resulting in the proliferation of risk and vulnerability to attacks in various network zones. This study conducts deductive research on the standard frameworks of identity-based zero-trust (ZT) systems, as implemented in the United States and India, both at an industrial level and in other domains. The research substantiates their soundness based on the available factual data regarding the updates and advancements made in addressing the evolving security and user-access management concerns. In the subsequent section, the conclusion highlights potential areas for enhancement and notable characteristics observed in the respective models that can be integrated to develop a zone-neutral ZT model. This result showed that India’s ZT infrastructure lacks the scalability and innovation scope of the USA’s ZT system. Thus, in order to develop a zone-neutral model operational in both areas, India’s model should be integrated with advanced classification, detection, and user management systems and better areas of application.

Keywords: zero trust, user identity, authentication, regional ZT, ZT systems

[This article belongs to International Journal of Mobile Computing Technology(ijmct)]

How to cite this article: Sampath Talluri Zero Trust Security Governance by Utilizing Identity and Access Management ijmct 2023; 01:6-18
How to cite this URL: Sampath Talluri Zero Trust Security Governance by Utilizing Identity and Access Management ijmct 2023 {cited 2023 Jul 20};01:6-18. Available from: https://journals.stmjournals.com/ijmct/article=2023/view=0

var fieldValue = “[user_role]”;
if (fieldValue == ‘indexingbodies’) {
document.write(‘Full Text PDF‘);
}
else if (fieldValue == ‘administrator’) { document.write(‘Full Text PDF‘); }
else if (fieldValue == ‘ijmct’) { document.write(‘Full Text PDF‘); }
else { document.write(‘ ‘); }

References

(2023). Zero trust. ManageEngine. https://www.manageengine.com/active-directory-360/manage-and-protect-identities/zero-trust-security.html
Kerman , A., Borchert, O., & Rose , S. (2020). (rep.). Implementing A Zero Trust Architecture.
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. https://doi.org/10.6028/nist.sp.800-207
(2021). (rep.). Zero Trust: 2021 A revolutionary approach to Cyber or just another buzz word?
Heath, D. (2023, April 18). The evolution of Zero Trust and the frameworks that guide it. IBM Blog. https://www.ibm.com/blog/the-evolution-of-zero-trust-and-the-frameworks-that-guide-it/
(2023). The state of Zero trust security in global organizations. https://www.okta.com/resources/reports/state-of-zero-trust-security-in-global-organizations/
Guru, S. (2022, July 27). The new standard for cyber security of organisations and enterprises: Zero trust architecture. Cyber Secure India. https://cybersecureindia.in/new-standard-for-cyber-security-organisations-and-enterprises-zero-trust-architecture/
Raina , K. (2023, April 17). What is Zero trust security? principles of the zero trust model. crowdstrike.com. https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/
Teplinsky, M. (2023, September 13). A review of NIST’s draft Cybersecurity Framework 2.0. Default. https://www.lawfaremedia.org/article/a-review-of-nist-s-draft-cybersecurity-framework-2.0
Chaudhry, U. B., & Hydros, A. K. (2023). Zero‐trust‐based security model against data breaches in the banking sector: A blockchain consensus algorithm. IET Blockchain, 3(2), 98–115. https://doi.org/10.1049/blc2.12028
Adahman, Z., Malik, A. W., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 102911. https://doi.org/10.1016/j.cose.2022.102911
Alappat, Mathews Rajan. (2023) “Multifactor Authentication Using Zero Trust”. Thesis. Rochester Institute of Technology. Accessed from
Paul, B., & Rao, M. (2022). Zero-trust model for Smart Manufacturing Industry. Applied Sciences, 13(1), 221. https://doi.org/10.3390/app13010221
Adahman, Z., Malik, A. W., & Anwar, Z. (2022a). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 102911. https://doi.org/10.1016/j.cose.2022.102911
Fernandez, E. B., & Brazhuk, A. (2022). A critical analysis of zero trust architecture (ZTA). SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4210104
He, Y., Huang, D., Chen, L., Ni, Y., & Ma, X. (2022). A survey on Zero Trust Architecture: Challenges and future trends. Wireless Communications and Mobile Computing, 2022, 1–13. https://doi.org/10.1155/2022/6476274
Zhang, Y. (2023). Privacy-preserving with Zero trust computational intelligent hybrid technique to English education model. Applied Artificial Intelligence, 37(1). https://doi.org/10.1080/08839514.2023.2219560
Sampath Talluri. Vamsy Priya Anne. Active Directory Implementation: Resolving Provisioning / Deprovisioning Access and Ensuring Accurate User Identity and Access Across The Organization Using IAM. International Journal of Information Technology (IJIT). 2023;4(02):29-37.
Liu, H., Ai, M., Huang, R., Qiu, R., & Li, Y. (2022). Identity authentication for edge devices based on zero‐trust architecture. Concurrency and Computation: Practice and Experience, 34(23). https://doi.org/10.1002/cpe.7198
Feng, Y., Zhong, Z., Sun, X., Wang, L., Lu, Y., & Zhu, Y. (2023). Blockchain enabled Zero trust based authentication scheme for Railway Communication Networks. Journal of Cloud Computing, 12(1). https://doi.org/10.1186/s13677-023-00411-z
(2023). (rep.). Public Draft: The NIST Cybersecurity Framework 2.0 National Institute of Standards and Technology.
Sathyajith, S. (2022, August 18). Role of zero trust in India’s Digital Transformation Journey. Entrepreneur. https://www.entrepreneur.com/en-in/growth-strategies/role-of-zero-trust-in-indias-digital-transformation-journey/433648
(2021). (rep.). Safe & Trusted Internet: Guidelines on Information Security Practices for Government Entities.
Tejaswi, M. (2023, April 29). Zero trust to become cornerstone of data security this year in India: Dell’s Ripu Bajwa. The Hindu. https://www.thehindu.com/business/zero-trust-to-become-cornerstone-of-data-security-this-year-in-india-dells-ripu-bajwa/article66793069.ece
Razavian M, Paech B, Tang A. The vision of on-demand architectural knowledge systems as a decision-making companion. Journal of Systems and Software. 2023 Apr 1;198:111560.


Regular Issue Subscription Review Article
Volume 01
Issue 02
Received June 24, 2023
Accepted July 7, 2023
Published July 20, 2023

function myFunction2() {
var x = document.getElementById(“browsefigure”);
if (x.style.display === “block”) {
x.style.display = “none”;
}
else { x.style.display = “Block”; }
}
document.querySelector(“.prevBtn”).addEventListener(“click”, () => {
changeSlides(-1);
});
document.querySelector(“.nextBtn”).addEventListener(“click”, () => {
changeSlides(1);
});
var slideIndex = 1;
showSlides(slideIndex);
function changeSlides(n) {
showSlides((slideIndex += n));
}
function currentSlide(n) {
showSlides((slideIndex = n));
}
function showSlides(n) {
var i;
var slides = document.getElementsByClassName(“Slide”);
var dots = document.getElementsByClassName(“Navdot”);
if (n > slides.length) { slideIndex = 1; }
if (n (item.style.display = “none”));
Array.from(dots).forEach(
item => (item.className = item.className.replace(” selected”, “”))
);
slides[slideIndex – 1].style.display = “block”;
dots[slideIndex – 1].className += ” selected”;
}