Skip to main content

ZERO TRUST SECURITY: REDEFINING DATA PROTECTION IN THE DIGITAL ERA

Page 1

International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 11 Issue: 05 | May 2024

www.irjet.net

p-ISSN: 2395-0072

ZERO TRUST SECURITY: REDEFINING DATA PROTECTION IN THE DIGITAL ERA Naga Vinod Duggirala Andhra University, INDIA ---------------------------------------------------------------------------***--------------------------------------------------------------------ABSTRACT: Zero Trust security is a big change in the way data is protected. It's a more flexible and reliable way to deal with the problems that come with standard perimeter-based security models. This piece talks about the ideas behind Zero Trust, such as microsegmentation, least privilege access, and continuous verification. It also talks about the benefits of using this security model, such as better compliance, higher visibility, and stronger security. The article also talks about the problems that companies face when they try to adopt Zero Trust, such as how hard it is to understand, how much resources it takes, and how to connect it to older systems. It also gives useful advice for a step-by-step approach.

Keywords: Zero Trust Security, Data Protection, Continuous Verification, Least Privilege Access, Micro-segmentation

INTRODUCTION: Businesses are quickly going digital, and there are a lot of cloud services available. This has made the attack surface bigger, so standard security measures don't work anymore [1]. IBM just did a study and found that the average cost of a data breach in 2021 was $4.24 million, which is 10% more than in 2019 [4]. When you use perimeter-based security models, you trust everything inside the network. This leaves your company open to insider risks and attackers moving laterally [2]. So much so that the Ponemon Institute found that insider risks were responsible for 60% of data breaches in 2020 [5]. Zero Trust security gets around these problems by taking the "never trust, always verify" stance and seeing all users, devices, and network data as

© 2024, IRJET

|

Impact Factor value: 8.226

|

ISO 9001:2008 Certified Journal

|

Page 1265


Turn static files into dynamic content formats.

Create a flipbook
ZERO TRUST SECURITY: REDEFINING DATA PROTECTION IN THE DIGITAL ERA by IRJET Journal - Issuu