International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024
www.irjet.net
p-ISSN: 2395-0072
ZERO TRUST SECURITY MODEL: IMPLEMENTATION STRATEGIES AND EFFECTIVENESS ANALYSIS Sandeep Reddy Gudimetla HCL Tech, USA --------------------------------------------------------------------------***-----------------------------------------------------------------------ABSTRACT: The Zero Trust security model has become a new way of thinking about cybersecurity that challenges old ways of thinking about security that are built on perimeters. This article talks about how to set up Zero Trust architectures and how well they work by looking at the ideas behind limiting access and constantly checking trust for both internal and external network traffic. The study looks into how technologies like micro-segmentation, identity-based access controls, continuous identification, and encryption can be used in places with no trust. This study looks at real-life case studies and empirical reviews to find out what the pros and cons of Zero Trust implementations are. Zero Trust is good at protecting against threats from inside the network, moving laterally, and attacks from outside the network, according to the findings. Because of this, it is a proactive and adaptable security framework for current networks. Keywords: Zero Trust Security, Micro-segmentation, Identity-based Access Controls, Continuous Authentication and Monitoring, Encryption and Data Protection
1. INTRODUCTION Today's security methods need to change drastically because cyber threats are changing so quickly and network systems are getting more complicated. If you think of trusted internal networks and untrusted external networks, then traditional perimeter-based security models won't work when it comes to complex attacks and insider risks [1]. Ponemon Institute recently released a study that says the average cost of a data breach in companies using old-fashioned security measures hit $4.24 million in 2021, which is 10% more than the previous year [2]. In addition, the 2021 Verizon Data Breach Investigations
© 2024, IRJET
|
Impact Factor value: 8.226
|
ISO 9001:2008 Certified Journal
|
Page 1186