ESP Journal of Engineering & Technology Advancements |
© 2022 by ESP JETA |
Volume 2 Issue 2 |
Year of Publication : 2022 |
Authors : Himanshu Sharma |
: 10.56472/25832646/ESP-V2I2P110 |
Himanshu Sharma, 2022. "Zero Trust in the Cloud: Implementing Zero Trust Architecture for Enhanced Cloud Security", ESP Journal of Engineering & Technology Advancements 2(2): 78-91.
One of the innovations making organizations experiment with new ways of storing and processing their information is cloud computing; it presents them with both the chance and the threat. Limitations of conventional security models of perimeter protection that are based on the assumption of the security of all devices inside the network are also becoming critical under the conditions of active cyber threats and the sharing of cloud environments. There is a more recent and rather comprehensive approach called Zero Trust Architecture or Zero Trust Extended or Zero Trust Tourism commonly referred to by its mantra of never trust, always verify. Zero Trust refers to a security model that has gained popularity and is used in cloud environments to provide improved security through the enforcement of identity verification, monitoring, and segmentation. This paper starts with a description of the Zero Trust model strategy and its key principles, as well as a comparison with the conventional security strategies. It then drills down and gives a concrete look at how unique the cloud and its security problems are by probing into various problems such as the problem of growing access points, problems of visibility and finally the problem of hybrid and multi-cloud. The Literature review on the Zero Trust systems and their implementation in cloud security discusses the recent literature studies and shares the gaps which are targeted by this paper. In the present work, the methodology that has been used to process the issue and start the implementation of Zero Trust groundwork in a cloud environment is described in detail: The selection of the proper technologies, the usage of IAM systems, Micro-segmentation, and Continuous monitoring. They then go further to elaborate on each of the findings to expound on how Zero Trust enhances cloud security threats that are unique to the cloud, compliance, and minimize the attack surface. Lastly, the conclusion presents the research outcomes, the limitations of this research, and the implication for cloud security, as well as the recommendations for the organization that intends to adopt the Zero Trust security model in their cloud infrastructure. Apart from that, the paper presents the threats and risks associated with Zero Trust as well as the pros and cons of its application concerning cloud technology.
[1] Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture. NIST Special Publication 800-207. National Institute of Standards and Technology.
[2] Kindervag, J. (2010). No More Chewy Centers: Introducing the Zero Trust Model of Information Security. Forrester Research.
[3] Sarkar, S., Choudhary, G., Shandilya, S. K., Hussain, A., & Kim, H. (2022). Security of zero trust networks in cloud computing: A comparative review. Sustainability, 14(18), 11213.
[4] Stafford, V. (2020). Zero trust architecture. NIST special publication, 800, 207.
[5] Bartakke, J., & Kashyap, R. (2024). The Usage of Clouds in Zero-Trust Security Strategy: An Evolving Paradigm. Journal of Information and Organizational Sciences, 48(1), 149-165.
[6] Chimakurthi, V. N. S. S. (2020). The challenge of achieving zero trust remote access in multi-cloud environment. ABC Journal of Advanced Research, 9(2), 89-102.
[7] Mehraj, S., & Banday, M. T. (2020, January). Establishing a zero trust strategy in cloud computing environment. In 2020 International Conference on Computer Communication and Informatics (ICCCI) (pp. 1-6). IEEE.
[8] Rodigari, S., O'Shea, D., McCarthy, P., McCarry, M., & McSweeney, S. (2021, September). Performance analysis of zero-trust multi-cloud. In 2021 IEEE 14th International Conference on Cloud Computing (CLOUD) (pp. 730-732). IEEE.
[9] Ahmadi, S. (2024). Zero trust architecture in cloud networks: application, challenges and future opportunities. Ahmadi, S.(2024). Zero Trust Architecture in Cloud Networks: Application, Challenges and Future Opportunities. Journal of Engineering Research and Reports, 26(2), 215-228.
[10] Ferretti, L., Magnanini, F., Andreolini, M., & Colajanni, M. (2021). Survivable zero trust for cloud computing environments. Computers & Security, 110, 102419.
[11] Adahman, Z., Malik, A. W., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122, 102911.
[12] do Amaral, T. M. S., & Gondim, J. J. C. (2021, November). Integrating Zero Trust in the cyber supply chain security. In 2021 Workshop on Communication Networks and Power Systems (WCNPS) (pp. 1-6). IEEE.
[13] Basta, N., Ikram, M., Kaafar, M. A., & Walker, A. (2022, April). Towards a zero-trust micro-segmentation network security strategy: an evaluation framework. In NOMS 2022-2022 IEEE/IFIP Network Operations and Management Symposium (pp. 1-7). IEEE.
[14] What Is Zero Trust for the Cloud?, paloaltonetworks, online. https://www.paloaltonetworks.com/cyberpedia/what-is-a-zero-trust-for-the-cloud
[15] What Is Zero Trust?, zscaler, online. https://www.zscaler.com/resources/security-terms-glossary/what-is-zero-trust
[16] Das, R. (2024). The Zero Trust Framework and Privileged Access Management (PAM). CRC Press.
[17] What Is Zero Trust and Why Is it So Important?, cyberark, online. https://www.cyberark.com/resources/blog/what-is-zero-trust-and-why-is-it-so-important
[18] Capili, M. (2024). Simulation-Based Evaluation of Perimeter-Based and Zero Trust Security Implementation on Internet of Things (Doctoral dissertation, The George Washington University).
[19] Daniel, J. (2023). Implementing Zero Trust Security Models to Combat Cyber.
[20] Zero trust is the Best Digital Risk Management Approach, epam, online. https://www.epam.com/insights/blogs/zero-trust-is-the-best-digital-risk-management
Zero Trust Architecture, Cloud Security, Identity And Access Management, Micro-Segmentation, Continuous Monitoring, Cloud Computing, Cybersecurity.