Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations

保存先:
書誌詳細
出版年:Journal of Cybersecurity and Privacy vol. 5, no. 1 (2025), p. 2
第一著者: Dakić, Vedran
その他の著者: Morić, Zlatan, Kapulica, Ana, Regvart, Damir
出版事項:
MDPI AG
主題:
オンライン・アクセス:Citation/Abstract
Full Text + Graphics
Full Text - PDF
タグ: タグ追加
タグなし, このレコードへの初めてのタグを付けませんか!

MARC

LEADER 00000nab a2200000uu 4500
001 3181524658
003 UK-CbPIL
022 |a 2624-800X 
024 7 |a 10.3390/jcp5010002  |2 doi 
035 |a 3181524658 
045 2 |b d20250101  |b d20250331 
100 1 |a Dakić, Vedran 
245 1 |a Analysis of Azure Zero Trust Architecture Implementation for Mid-Size Organizations 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a The Zero Trust Architecture (ZTA) security system follows the “never trust, always verify” principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cloud environment to improve security. Implementation takes time and effort. Azure’s extensive services and customizations require careful design and implementation. Azure administrators need help navigating and changing configurations due to its complex user interface (UI). Each Azure ecosystem component must meet ZTA criteria. ZTAs comprehensive policy definitions, multi-factor and passwordless authentication, and other advanced features are tested in a mid-size business scenario. The document delineates several principal findings concerning the execution of Azure’s ZTA within mid-sized enterprises. Azure ZTA significantly improves security by reducing attack surfaces via ongoing identity verification, stringent access controls, and micro-segmentation. Nonetheless, its execution is resource-demanding and intricate, necessitating considerable expertise and meticulous planning. A notable disparity exists between theoretical ZTA frameworks and their practical implementation, characterized by disjointed management interfaces and user fatigue resulting from incessant authentication requests. The case studies indicate that although Zero Trust Architecture enhances organizational security and mitigates risks, it may disrupt operations and adversely affect user experience, particularly in hybrid and fully cloud-based settings. The study underscores the necessity for customized configurations and the equilibrium between security and usability to ensure effective ZTA implementation. 
653 |a User interface 
653 |a User services 
653 |a Blockchain 
653 |a User experience 
653 |a Investigations 
653 |a Automation 
653 |a Cloud computing 
653 |a Access control 
653 |a Virtual reality 
653 |a Internet of Things 
653 |a Decision making 
653 |a Efficiency 
700 1 |a Morić, Zlatan 
700 1 |a Kapulica, Ana 
700 1 |a Regvart, Damir 
773 0 |t Journal of Cybersecurity and Privacy  |g vol. 5, no. 1 (2025), p. 2 
786 0 |d ProQuest  |t ABI/INFORM Global 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3181524658/abstract/embedded/09EF48XIB41FVQI7?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3181524658/fulltextwithgraphics/embedded/09EF48XIB41FVQI7?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3181524658/fulltextPDF/embedded/09EF48XIB41FVQI7?source=fedsrch