SSRN 4725283
SSRN 4725283
Author’s contribution
The sole author designed, analyzed, interpreted and prepared the manuscript.
Article Information
DOI: 10.9734/JERR/2024/v26i21083
Received: 01/02/2024
Accepted: 10/02/2024
Original Research Article
Published: 13/02/2024
ABSTRACT
Cloud computing has become essential in this digital world as it provides opportunities and
challenges for organizations. This research explores the implementation and effectiveness of Zero
Trust Architecture (ZTA) in addressing security challenges within cloud networks. Utilizing
qualitative research methods, including a systematic literature review from 2020 to 2024, the study
investigates insights from diverse sources such as journal articles, academic literature, and case
studies. Thematic analysis organizes findings into critical themes, revealing ZTA's impact on
mitigating lateral movement, reducing insider threat probability, enhancing network micro-
segmentation, and improving identity and access management. The comparative analysis
demonstrates significant improvements in security incidents post-ZTA implementation. Moreover,
the study highlights best practices for ZTA adoption and outlines future advancements, including
integration with emerging technologies like machine learning and artificial intelligence. This
research underscores ZTA's pivotal role in fortifying cloud network security and offers valuable
insights for practitioners and researchers.
_____________________________________________________________________________________________________
Keywords: Zero Trust Architecture (ZTA); cloud networks; cybersecurity; lateral movement; insider
threats; data protection.
216
hack. It also reduces the scope of access, which principle and its working. They found that micro-
helps prevent data breaches on a large scale. segmentation can take place on granular levels
in a network. It also provides insights into which
Micro-segmentation is also another important network applications communicate with each
concept of zero-trust architecture. According to other and how network traffic flows between
this principle, any traffic moving out of, into, or them. This is mainly termed as application layer
within a network can be a threat. It helps in visibility. It makes micro-segmentation different
isolating such threats before they spread. This from dividing a network with the help of VLANs or
helps in preventing the lateral movement of the any other network layer method. Fig. 2 shows
threats. Xie et al. [7] conducted research on this Zero Trust micro-segmentation.
217
In addition to the fundamental principles of least segmentation in ZTA provides many benefits. It
privilege and micro-segmentation, Zero Trust reduces the attack surface by limiting access to
Architecture (ZTA) encompasses several other confidential data based on the principle of 'never
critical principles for enhancing cloud network trust, always verify.' It also improves the
security. Continuous authentication ensures network's performance by reducing traffic volume
ongoing verification of users, devices, and in every segment. This also results in fast
applications, reducing the risk of unauthorized response time and low latency. Network
access by validating identities consistently. segmentation also leads to simplified compliance
Policy-based access controls enable in the zero-trust model.
organizations to implement granular access
permissions based on defined policies, Data protection is critical in cloud environments.
enhancing flexibility and security. ZTA also For this purpose, zero trust architecture
emphasizes the importance of designing systems implements different encryption methods to
and networks with security in mind from the ensure privacy and security. Chen et al. [11] also
outset, promoting the integration of security conducted research in this regard. It was seen
measures throughout the development process. that both asymmetric and symmetric encryption
Real-time visibility and analytics allow are used in zero-trust architecture. Symmetric
organizations to continuously monitor network encryption is much faster, but asymmetric is
traffic and user behavior, facilitating early better in terms of security. If a company destroys
detection and response to security or loses its access key, its private data can be
incidents. Additionally, encryption plays a vital recovered using the encryption methods
role in ZTA by safeguarding data in transit implemented in zero trust architecture.
and at rest, ensuring confidentiality, integrity, Encryption also helps the network in
and authenticity. Incorporating these authentication and regulatory compliance.
principles into ZTA provides a holistic approach Overall, it helps a company prevent data
to mitigating security risks and breaches and ensure secure networks.
protecting sensitive information in cloud
environments. Implementing Zero Trust Architecture (ZTA) in
cloud network infrastructure involves several key
Multi-factor authentication (MFA) is another strategies to enhance security and mitigate risks.
critical component of ZTA. It adds an extra layer One crucial aspect of ZTA implementation is
of protection to the network by requiring different adopting strict identity and access management
verification forms before giving access to (IAM) policies. By implementing IAM controls,
resources. In zero trust architecture, the aspect organizations can ensure that only authorized
of trust is never assumed. It treats each access users, devices, and applications can access
request as coming from an untrusted network. network resources, following the principle of least
Khan [9] also researched this principle. privilege. Additionally, organizations leverage
According to the researcher, MFA is also needed network segmentation techniques to
for regulatory compliance in different industries. compartmentalize their network environments,
Regulations like GDPR, HIPAA, etc., enforce limiting the potential impact of security breaches
companies to implement this principle to and minimizing lateral movement within the
protect private information. It involves using network.
factors such as PIN or password, biometric
verification, facial recognition, etc., which helps
Furthermore, ZTA implementation often involves
gain a high level of assurance regarding the
the deployment of multi-factor authentication
user's identity.
(MFA) mechanisms, adding an extra layer of
2.3 Implementing Zero Trust in Cloud security to verify user identities. This approach
reduces the risk of unauthorized access even if
Network Infrastructure
credentials are compromised. Continuous
Network segmentation is also used in zero-trust monitoring and anomaly detection capabilities
architecture to separate important assets and are also integral to ZTA, allowing organizations
restrict access to authorized systems and users. to detect and respond to security threats in
This aspect helps in reducing security breaches real time. Implementing ZTA in cloud
within a smaller segment. This makes it easy to network infrastructure strengthens security
respond to or detect any security incidents. posture, enhances data protection, and
According to yler and Viana [10], network aligns with modern cybersecurity best practices.
218
219
threats pose different risks to the system. It can organizations different opportunities for
lead to theft or loss of sensitive information. It efficiency. In addition, this change has come with
can also damage the company's reputation, and its security challenges. As businesses transform
it might lose the trust of its clients. Therefore, it is their data and operations to the cloud, there are
essential to analyze the nature of these issues of safeguarding sensitive information [17].
threats and find the best methods to mitigate This section adds to organizations’ different
them. problems in securing cloud networks, which
increases the need for a robust security system
The zero trust model helps in overcoming insider like the Zero Trust Architecture (ZTA).
threats in many ways. This system assumes that
no single person should be trusted. It thus 3.1 Increased Attack Surface
checks the people inside the network as well. For
this purpose, the system uses role-based access One of the main challenges in securing cloud
controls (RBAC). According to Yao et al. [15], networks is the increase in attacks [18]. Unlike
zero trust architecture uses RBAC to ensure that the old measures, where data was limited within
people only have the necessary permissions the boundaries, cloud data is distributed across
based on their responsibilities within the different servers and networks. This system
company. It only provides broad access to some introduces multiple entry points for attacks as
individuals, and workers are provided access data travels through different paths and interacts
only to the data and resources needed to with various components. The extensive nature
perform their jobs. In this way, if an insider's of the cloud increases the hurdles of monitoring
credentials are compromised, the damage to the and defending against attacks, which
network is prevented. It also helps implement the necessitates a shift from security models. Fig. 3
principle of least privilege, reducing the attack depicts challenges in cloud security.
surface and limiting insider threats' negative
influence [16]. 3.2 Dynamic Nature of Cloud
Environments
Zero trust architecture also uses continuous
anomaly detection and monitoring to identify The cloud system is characterized by its specific
suspicious activity. It also includes the analysis of nature, which allows organizations to increase
patterns of network activities or user behavior resources based on demand [20]. While this
over time. When an insider starts behaving in a enhances operational ability and process, it
way that is not similar to their usual actions, the poses challenges for security management. Old
system triggers an alert, and immediate actions security measures designed for fixed systems
are taken to secure the system. Using these need help to add to the changes in the cloud
security frameworks in zero-trust architecture ecosystems. The ability to spin up the resources
helps companies protect their digital platforms on the fly makes maintaining a secure security
and ensure network performance. posture difficult. This demands security solutions
that can be uniquely added to the changing cloud
While access management is fundamental to system.
mitigating insider threats, ZTA offers additional
strategies to bolster security. These may include
implementing user behavior analytics (UBA) to 3.3 The Complexity of Identity and
detect anomalous activities, deploying data loss Access Management
prevention (DLP) solutions to safeguard sensitive
information, and conducting regular security Identity and Access Management (IAM) has
awareness training to educate employees about become increasingly difficult in the cloud system,
potential risks. By adopting a comprehensive given the limited range of users, devices, and
approach that combines access management applications accessing resources [21]. The old
with these additional measures, organizations security model, dependent on generating trust
can effectively mitigate the dangers posed by within the internal network, becomes
insider threats in cloud networks. unnecessary in this scenario. Managing user
identities ensures excellent access benefits and
3. PROBLEM DEFINITION maintains a detailed view of access activities
across cloud services. The difficulty of these
The addition of cloud computing in the system tasks increases in large-scale cloud
has changed the digital system, which offers deployments.
220
221
222
scholarly articles, research studies, and other curating a comprehensive dataset from diverse
pertinent literature about Zero Trust Architecture and relevant sources, the research aims to
(ZTA) and its application within cloud networks. enrich the qualitative analysis and thoroughly
This method thoroughly examines past research explore ZTA's implications and effectiveness in
methodologies, findings, and theoretical cloud security. This approach ensures that the
frameworks, providing a solid foundation for the research findings are grounded in a robust
current study. By systematically reviewing foundation of existing knowledge and insights
existing literature, the research aims to derive from the literature.
detailed insights into the principles of ZTA and its
implications for cloud network security. The 4.5 Analytical Process
literature review enriches the analytical process
by offering valuable context, theoretical The analytical process includes the thematic
perspectives, and empirical evidence. Moreover, analysis in which all the data is divided into
organizing the collected data thematically themes so that all the information can be
enables a structured approach to analysis, organized in sections and easily access helpful
interpretation, and synthesis, facilitating the information. Thematic analysis involves
generation of meaningful conclusions regarding categorizing data into themes based on recurring
ZTA implementation and its impact on patterns, topics, or concepts in the literature.
organizational security practices within cloud These themes are derived from various aspects
environments. of Zero Trust Architecture (ZTA) implementation,
observed outcomes, and security challenges
4.4 Recruitment within cloud networks. The study aims to
facilitate easy access to relevant information and
This research study includes a qualitative insights by categorizing the data into themes.
research method, which is why there is no direct The literature review findings are synthesized to
recruitment of participants. This includes address the research objectives and questions
selecting relevant studies, reports, and research comprehensively. Through this analytical
papers that provide valuable insights regarding approach, the study seeks to elucidate the
the research questions. The recruitment process impact of ZTA and develop a deeper
involves carefully choosing past studies between understanding of its practical implications and
2020 and 2024 that offer valuable insights challenges in cloud network security. This
related to the research questions and objectives. method ensures the research findings are
The selection criteria prioritize the content's systematically analyzed and interpreted to
relevance to the study's focus on Zero Trust provide meaningful insights into ZTA
Architecture (ZTA) within cloud networks. By implementation.
223
5. RESULTS AND DISCUSSION that expert security teams can protect the overall
system. n addition, according to ZTA, the users
5.1 Lateral Movement Analysis are provided with limited access to the
resources; it means they only get access to
This research study used a comprehensive those used for performing their tasks.
model for assessing the effectiveness of Zero
Trust Architecture (ZTA) so that the lateral 5.2 Insider Threat Probability
movement of cyber threats within a network
environment could be mitigated. The lateral Zero Trust Architecture (ZTA) is not limited to
movement analysis includes several aspects, providing traditional security as it implements the
such as the average time for containing the principle of "never trust, always verify." This
threats, the number of successful lateral means all the users are verified before giving
movement attempts, and overall attack surface access to the system, regardless of whether they
reduction accomplished with the help of the are already users of that network. His approach
implementation of ZTA. His research helps reduce the rate of insider risks and threats
demonstrates a significant decrease in lateral that might be intentional or unintentional. His
movement incidents that occur due to the research study emphasizes the impact of ZTA on
adoption of ZTA. For instance, the number of insider threat incidents, and the findings show a
successful lateral movement attempts decreased significant decrease in insider threat due to
by 72% compared to the ZTA baseline. On the implementation. For example, the number of
other hand, some organizations faced a insider threats has decreased by about 65%, and
reduction of about 90%. Moreover, the time the financial impact of these insider threats has
required for containing lateral threats also also reduced by 40%.
dropped by about 60%, allowing the security
teams to deal with potential threats effectively The insider threat probability can be reduced with
and efficiently. Formula 4 shows how to calculate ZTA because several vital elements are
successful lateral movement attempts. responsible for this. For example, User Behavior
Analytics (UBA) helps monitor user activity and
LMA = InitialSuccessfulLateralMovement- detect changes in routine behavior patterns [26].
FinalSuccessfulLateralMovement / He helps detect the threats in the initial stage so
InitialSuccessfulLateralMovement x 100% (4) they can be mitigated promptly. Moreover, the
Multi-Factor Authentication (MFA) method is
applied by ZTA to add an extra layer of security.
The significant factors that can lead to these This makes it difficult for attackers to affect the
reductions include continuous monitoring, security of a system or cause a data breach.
network segmentation, least privilege access,
and Multi-Factor Authentication (MFA). For 5.3 Network Micro-Segmentation
instance, the network is divided into smaller Effectiveness
segments, so ZTA can restrict the attackers'
potential pathways to move laterally. In this This research study shows that micro-
case, even if the attacker gets access to one segmentation helps prevent the lateral
segment in the network, he cannot affect the movement of cyber threats within a network. This
network as a whole. Moreover, system health, is because isolated segments or zones are
network traffic, and user activity can be created to restrict the risk spread and minimize
constantly monitored with the help of ZTA. This its ability to roam around the network. Moreover,
leads to detecting the errors and threats early so the implementation of micro-segmentation is
224
practical when it comes to controlling network risks and unauthorized access. Moreover, the
traffic. When the segments are created in a IAM enhancement in the Zero Trust Architecture
network, the organizations can apply specific includes limited access to devices, applications,
access controls to every segment. This way, and users.
only authorized devices and people can access
that segment, protecting it from unauthorized It is well-known that manual IAM tasks such as
users or attackers. access reviews and user provisioning can be
time-consuming and may also contain some
In addition, the results show that micro- errors. ZTA has resolved this issue by
segmentation also helps enhance the overall automating such processes. This is done by
visibility of network traffic. automated user provisioning/de-provisioning and
dynamic access control. Moreover, visibility and
Organizations can get better insights regarding control can also be enhanced by this architecture
network behavior when closely monitoring all with the help of centralized logging and
segments' communication. When any change in monitoring, as well as real-time threat detection.
the expected patterns occurs, it is identified in no
time, creating a smooth response regarding 5.5 Encryption and Data Protection
potential security incidents. The other benefit of
micro-segmentation is the containment of It is the objective of hackers to steal the personal
security incidents. If one segment is attacked, information and data of individuals and
the others can be protected so that the scope of organizations. That's why it is essential to focus
potential damage can be minimized and a more on implementing a robust model or system for
efficient response can be facilitated for dealing enhancing overall security. The Zero Trust
with security incidents. Security model focuses on increasing the
organization’s data security and integrating
5.4 Identity and Access Management current laws to provide flexibility for adopting
(IAM) Enhancements future security and privacy laws [28]. Ata security
is the primary goal of this model because
Identity and access management (IAM) hackers are always trying to steal confidential
enhancements play an essential role in the data. The encryption technique protects the
framework of zero-trust architecture in cloud data-in-transit and data-at-rest within the cloud
networks, leading to enhanced security storage devices. If a data breach occurs,
measures and access control [27]. Implementing unauthorized users will not be able to read the
Zero Trust principles simplifies the complexities data except the authorized person because of
of IAM in cloud networks as continuous the limited access to data. Fig. 5 shows the key
verification focuses on reducing the associated features of encrypted cloud storage.
225
226
227
© 2024 Ahmadi; This is an Open Access article distributed under the terms of the Creative Commons Attribution License
(http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium,
provided the original work is properly cited.
Peer-review history:
The peer review history for this paper can be accessed here:
https://www.sdiarticle5.com/review-history/113275
228