Vol. 18, No. 9, September 30, 2024
10.3837/tiis.2024.09.011,
Download Paper (Free):
Abstract
The philosophy of Zero Trust in cybersecurity lies in the notion that nothing assumes to be trustworthy by default. This drives defense organizations to modernize their cybersecurity architecture through integrating with the zero-trust principles. The enhanced architecture is expected to shift protection strategy from static and perimeter-centric protection to dynamic and proactive measures depending on the logical contexts of users, assets, and infrastructure. Given the domain context of defense environment, we aim three challenge problems to tackle and identify four technical approaches by the security capabilities defined in the Zero Trust Architecture. First approach, dynamic access control manages visibility and accessibility to resources or services with Multi Factor Authentication and Software Defined Perimeter. Logical network separation approach divides networks on a functional basis by using Software Defined Network and Micro segmentation. Data-driven analysis approach enables machine-aided judgement by utilizing Artificial Intelligence, User and Entity Behavior Analytics. Lastly, Security Awareness approach observes fluid security context of all resources through Continuous Monitoring and Visualization. Based on these approaches, a comprehensive study of modern technologies is presented to materialize the concept that each approach intends to achieve. We expect this study to provide a guidance for defense organizations to take a step on the implementation of their own zero-trust architecture.
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Cite this article
[IEEE Style]
Y. Kim, S. Sohn, K. T. Kim, H. S. Jeon, S. Lee, Y. Lee, J. Kim, "Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study," KSII Transactions on Internet and Information Systems, vol. 18, no. 9, pp. 2665-2691, 2024. DOI: 10.3837/tiis.2024.09.011.
[ACM Style]
Youngho Kim, Seon-Gyoung Sohn, Kyeong Tae Kim, Hae Sook Jeon, Sang-Min Lee, Yunkyung Lee, and Jeongnyeo Kim. 2024. Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study. KSII Transactions on Internet and Information Systems, 18, 9, (2024), 2665-2691. DOI: 10.3837/tiis.2024.09.011.
[BibTeX Style]
@article{tiis:101209, title="Exploring Effective Zero Trust Architecture for Defense Cybersecurity: A Study", author="Youngho Kim and Seon-Gyoung Sohn and Kyeong Tae Kim and Hae Sook Jeon and Sang-Min Lee and Yunkyung Lee and Jeongnyeo Kim and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2024.09.011}, volume={18}, number={9}, year="2024", month={September}, pages={2665-2691}}