Submitted:
07 August 2024
Posted:
08 August 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
2. Principles of Zero-Trust Cybersecurity
2.1. Never Trust, Always Verify
2.2. Implement the Least Privilege
2.3. Assume Breach and Plan for the Worst
3. Issues for Implementing Zero-Trust
3.1. Insider Threat Management
3.2. Continuous Monitoring
3.3. Access Controls and Least Privilege
3.4. Training and Awareness
3.5. Customers/Users/Patrons
3.6. Cybersecurity Awareness for Customers/Users/Patrons
3.7. User-Focused Solutions
3.8. Hybrid Cloud Protection
3.9. Challenges in Hybrid Cloud Security
3.10. Implementing a Security Framework
3.11. Data Protection
3.12. Privacy
3.13. Monitoring and Detection
3.14. Access Controls and Least Privilege
4. Contextual Differences in Zero-Trust Cybersecurity
4.1. The University Environment
- Zero-trust can limit access to only the information employees need when they need it [70]. For instance, it is possible a student employee may need to access student records in the course of their work, but they have no legitimate rationale to have access to this information outside of work hours and their workstation.
- Faculty members have substantial amounts of information, including student grades and funding accounts, that must be protected [71]. When they leave a computer station unattended – such as in a classroom when they leave to use the restroom – they create a vulnerability. Session timeouts can protect these workstations by locking the computer and requiring a fresh log-in to access the station again. While this solution may cause frustration for some faculty members, it may also prevent a major breach.
- Students require access to many systems, offering a slightly different dynamic where they must share large amounts of private information but have limited access to the stored information of others [72]. Permissions must be managed to protect students from their own peers.
5. The Library Environment
- Protecting patrons against invasions of privacy by authorities could be supported by zero-trust measures. Historically, library records have been a target of police, who might use them to monitor patron behavior. The American Library Association, the leading organization for libraries, strongly opposes this activity and supports practices that restrict these efforts [76]. Nonetheless, it can be intimidating for an unprepared front-line library worker if confronted by law enforcement. A zero-trust system could prevent these officials from easily gaining access to this information from a front-line employee, forcing them to follow the prescribed path of receiving a warrant and communicating with the library director.
- As with the case of an instructor who leaves a computer unattended, session timeouts can be used to secure employee workstations to ensure no unmonitored patrons gain access to unauthorized information [77].
6. The Supply Chain Environment
- Supply chain organizations need to identify participants and boundaries, distinguish between internal and external participants (including suppliers, clients, and internal employees), and understand their roles and the level of access required [84].
- Identify supply chain assets by cataloging data, information, and systems within the enterprise, recognizing non-enterprise participants and technologies that interact with the supply chain, and understanding general business processes related to the organization’s mission, such as trust-related processes and contractually mandated procedures for non-enterprise participants, identifying threats posed by participants, assets, and processes, and conducting risk assessments to prioritize zero-trust implementation and its impact on business objectives (Collier & Sarkis, 2021).
- During deployment and monitoring, the organization should decide on a deployment strategy, possibly using a trial mode, and gather the necessary data to evaluate success while ensuring the ability to revert to the previous configuration [84].
- Finally, implementing zero-trust involves designing an iterative process that builds on successes and learns from failures, gradually transitioning, adjusting priorities, and incorporating continuous improvement into deployments [84].
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Conflicts of Interest
References
- Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. NIST Special Publication, 800-207.
- Bridge, S., & Zoledziowski, A. (2024). 1 million books and 4 months later, Toronto’s library recov-ers from a cyberattack. Canadian Broadcasting Corporation. https://www.cbc.ca/news/canada/toronto/toronto-library-ransomware-recovery-1.7126412.
- Kerman, A. (2020). Zero trust cybersecurity: ‘Never trust, always verify.’ https://www.nist.gov/blogs/taking-measure/zero-trust-cybersecurity-never-trust-always-verify.
- Department of Defense. (2022). Zero trust referenced architecture. https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf.
- Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and Application of Zero Trust Se-curity: A Brief Survey. Entropy, 25(12), 1595.
- Chen, Y., Hu, H., & Cheng, G. (2019). Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties. Frontiers of Information Technology & Electronic Engineering, 20(2), 238–252. [CrossRef]
- Assunção, P. (2019). A zero-trust approach to network security. Proceedings of the Digital Privacy and Security Conference, 2019, 65–72.
- Kumar, P., Moubayed, A., Refaey, A., Shami, A., & Koilpillai, J. (2019). Performance Analysis of SDP For Secure Internal Enterprises. 2019 IEEE Wireless Communications and Networking Conference, 1-6. [CrossRef]
- Buck, C., Olenberger, C., Schweizer, A., Völter, F., & Eymann, T. (2021). Never trust, always veri-fy: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security, 110, 102436.
- Rivera, J. J. D., Muhammad, A., & Song, W. C. (2024). Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open Journal of the Communications Society, 5, 2792-2814.
- Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. Journal of Network and Computer Applications, 101, 55-82.
- Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.
- Cunningham, C. (2018). Zero trust. https://go.forrester.com/blogs/next-generation-access-and-zero-trust/.
- Identity Management Institute. (n.d.). Digital identity certificate. https://identitymanagementinstitute.org/digital-identity-certificate/.
- West, M. (2013). Preventing system intrusions. In J. J. Vacca (Eds.), Network and system security (pp. 29-56). Syngress.
- DelBene, K., Medin, M., & Murray, R. (2019). The Road to Zero Trust (Security). DIB Zero Trust White Paper, 9.
- Azad, M. A., Abdullah, S., Arshad, J., Lallie, H., & Ahmed, Y. H. (2024). Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 101227.
- Bandari, V. (2023). Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types. International Journal of Business Intelligence and Big Data Analytics, 6(1), 1-11.
- Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 224-274.
- Sandhu, R. S. (1995). Role-based access control. IEEE Computer Computers, 29(2), 38-47.
- Fadhel, A. B. , Bianculli, D., & Briand, L. (2015). A comprehensive modeling framework for role-based access control policies. Journal of Systems and Software, 107, 110-126.
- Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2020). Dynamic access control and authorization system based on zero-trust architecture. Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, 123-127.
- Simpson, W. R., & Foltz, K. E. (2021). Network Segmentation and Zero Trust Architectures. Proceedings of the World Congress on Engineering 2021.
- Wagner, N., Sahin, C. S., Peña, J., & Streilein, W. (2019). Automatic Generation of Cyber Architectures Optimized for Security, Cost, and Mission Performance: A Nature-Inspired Approach, pp. 1–25. [CrossRef]
- Simpson, W. R. (2022). Toward a zero trust metric. Procedia Computer Science, 204, 123–130. [CrossRef]
- Kallatsa, M. (2024). Strategies for network segmentation: a systematic literature review. [Master Thesis]. University of Jyväskylä.
- Hemberg, E., Zipkin, J. R., Skowyra, R. W., Wagner, N., & O’Reilly, U.-M. (2018). Adversarial Co-Evolution of Attack and Defense in a Segmented Computer Network Environment. Proceedings of the Genetic and Evolutionary Computation Conference Companion, 1648–1655. [CrossRef]
- Katsis, C., Cicala, F., Thomsen, D., Ringo, N., & Bertino, E. (2021). Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 165–174. [CrossRef]
- Ghosemajumder, S. (2017). You can’t secure 100% of your data 100% of the time. https://hbr.org/2017/12/you-cant-secure-100-of-your-data-100-of-the-time.
- Kujo, J. (2023). Implementing zero trust architecture for identities and endpoints. [master thesis]. Jamk University of Applied Sciences. https://www.theseus.fi/bitstream/handle/10024/796603/Thesis_Jani_Kujo.pdf?sequence=2.
- National Institute of Standards and Technology. (2012). Guide for conducting risk assessment. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf.
- Ciampa, M. (2017). CompTIA security+ guide to network security fundamentals. Cengage Learning.
- Deane, A.J. & Kraus, A. (2021) The Official (ISC)2 CISSP CBK Reference, 6th Edition, Wiley.
- Cappelli, D., Moore, A., & Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (theft, Sabotage, Fraud). Addison-Wesley Professional.
- Ophoff, J., Jensen, A., Sanderson-Smith, J., & Porter, M. (2014). A descriptive literature review and classification of insider threat research. [CrossRef]
- Rousseau, T. L. (2021). Insider Threat: Replacing the Trusted Security Model (Doctoral dissertation, Capella University).
- Greitzer, F. L. (2019, April). Insider threats: It’s the human, stupid!. In Proceedings of the Northwest Cybersecurity Symposium (pp. 1-8).
- Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys (CSUR), 52(2), 1-40.
- Shah, V. (2021). Machine Learning Algorithms for Cybersecurity: Detecting and Preventing Threats. Revista Espanola de Documentacion Cientifica, 15(4), 42-66.
- Rabbani, M., Wang, Y., Khoshkangini, R., Jelodar, H., Zhao, R., Bagheri Baba Ahmadi, S., & Ayobi, S. (2021). A review on machine learning approaches for network malicious behavior detection in emerging technologies. Entropy, 23(5), 529.
- Johri, A., & Kumar, S. (2023). Exploring customer awareness towards their cyber security in the Kingdom of Saudi Arabia: A study in the era of banking digital transformation. Human Behavior and Emerging Technologies, 2023(1), 2103442.
- Moallem, A. (2019). Cybersecurity awareness among students and faculty. CRC Press.
- Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114, 106531.
- McCrohan, K. F., Engel, K., & Harvey, J. W. (2010). Influence of awareness and training on cyber security. Journal of Internet Commerce, 9(1), 23-41.
- Norris, D. F., Mateczun, L., Joshi, A., & Finin, T. (2018). Cybersecurity at the grassroots: American local governments and the challenges of internet security. Journal of Homeland Security and Emergency Management, 15(3), 20170048.
- Miranda, M. J. (2018). Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach. International Management Review, 14(2), 5-10.
- Li, Y., Xin, T., & Siponen, M. (2022). Citizens‘ cybersecurity behavior: Some major challenges. IEEE Security & Privacy, 20(1), 54-61.
- Zhang, Z., He, W., Li, W., & Abdous, M. H. (2021). Cybersecurity awareness training programs: a cost–benefit analysis framework. Industrial Management & Data Systems, 121(3), 613-636.
- Nurse, J. R., Creese, S., Goldsmith, M., & Lamberts, K. (2011, September). Guidelines for usable cybersecurity: Past and present. In 2011 third international workshop on cyberspace safety and security (CSS) (pp. 21-26). IEEE.
- AlQadheeb, A., Bhattacharyya, S., & Perl, S. (2022). Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior. Array, 14, 100146.
- Phiayura, P., & Teerakanok, S. (2023). A comprehensive framework for migrating to zero trust architecture. IEEE Access, 11, 19487-19511.
- Tissir, N., El Kafhali, S., & Aboutabit, N. (2021). Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposalLinks to an external site.. Journal of Reliable Intelligent Environments, 7(2), 69-84.
- Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
- Cloud Security Alliance (2021). Toward a Zero Trust Architecture: A Guided Approach for a Complex and Hybrid World. Cloud Security Alliance.
- National Institute of Standards and Technology (NIST). (2024). The NIST Cybersecurity Framework (CFS) 2.0. National Institute of Standards.
- Fotiou, N., Machas, A., Polyzos, G. C., & Xylomenos, G. (2015). Access control as a service for the Cloud. Journal of Internet Services and Applications, 6, 1-15.
- Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.
- Tourani, R. , Stubbs, R., & Misra, S. (2018, July). TACTIC: Tag-based access control framework for the information-centric wireless edge networks. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 456-466). IEEE.
- ang, Z. (2021, November). A Survey of Security Issues in Mobile Cloud ComputingLinks to an external site.. In 2021 International Conference on Signal Processing and Machine Learning (CONF-SPML) (pp. 117-121). IEEE.
- Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
- Reed, C. Rezek, C & P. Simmonds. Security Guidance for Critical Area of Focus in Cloud Computing V3.0, Cloud Security Alliance (CSA), 2011, p.1-177.
- Loaiza Enriquez, R. (2021). Cloud Security Posture Management/CSPM) in Azure.
- Mo, J., Hu, Z., Chen, H., & Shen, W. (2019). An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wireless Communications and Mobile Computing, 2019(1), 4520685.
- Ahmed, A. A., Wendy, K., Kabir, M. N., & Sadiq, A. S. (2020). Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Systems Journal, 15(1), 727-737.
- Derhab, A., Belaoued, M., Guerroumi, M., & Khan, F. A. (2020). Two-factor mutual authentication offloading for mobile cloud computing. IEEE Access, 8, 28956-28969.
- Mugabo, E., & Zhang, Q. Y. (2020). Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. International Journal of Network Security, 22(2), 231-241.
- Ogwara, N. O., Petrova, K., Yang, M. L., & MacDonell, S. (2021). Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach. Advances in Security, Networks, and Internet of Things: Proceedings from SAM’20, ICWN’20, ICOMP’20, and ESCS’20, 129-145.
- ackson, M. (2021). The Impact of Cyberattacks and Cyberthreats on Higher Education Institutions (Master’s thesis, The College of St. Scholastica).
- Ghosh, M. M. A., Atallah, R. R., & Naser, S. S. A. (2016). Secure mobile cloud computing for sensitive data: Teacher services for Palestinian higher education institutions. International Journal of Grid and Distributed Computing, 9(2), 17-22.
- DeWeaver, L. F. (2021). Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust (Doctoral dissertation, Colorado Technical University).
- Culnan, M. J., & Carlin, T. J. (2009). Online privacy practices in higher education: making the grade? Communications of the ACM, 52(3), 126-130.
- Daraghmi, E. Y., Daraghmi, Y. A., & Yuan, S. M. (2019). UniChain: a design of blockchain-based system for electronic academic records access and permissions management. Applied Sciences, 9(22), article 4966.
- Lund, B. D. (2021). Public libraries’ data privacy policies: a content and cluster analysis. The Serials Librarian, 81(1), 99-107.
- Hess, A. N., LaPorte-Fiori, R., & Engwall, K. (2015). Preserving patron privacy in the 21st century academic library. The Journal of Academic Librarianship, 41(1), 105-114.
- Amini, M., Vakilimofrad, H., & Saberi, M. K. (2021). Human factors affecting information security in libraries. The Bottom Line, 34(1), 45-67.
- Mars, P. (2017). ALA Precedent in Defense of Personal Privacy and Privacy Activism of 21st-Century Information Professionals. The Serials Librarian, 73(1), 54-57.
- Dietz, F. (2022). Timeout reached, session ends? (Doctoral dissertation, Humboldt Universitaet zu Berlin).
- Mentzer, J., Witt, W. D., Keebler, J., Min, S., Nix, N., Smith, D., & Zacharia, Z. (2001). Defining supply chain management. Journal of Business Logistics, 22(2), 1-25.
- ouncil of Supply Chain Management Professionals. (n.d.). Outbound logistics. In CSCMP Supply Chain Management Definitions and Glossary. https://cscmp.org/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms.aspx?hkey=60879588-f65f-4ab5-8c4b-6878815ef921.
- Felea, M., & Albăstroiu, I. (2013). Defining the concept of supply chain management and its relevance to Romanian academics and practitioners. Amfiteatru Economic Journal, 15(33), 74-88.
- Canadian Centre for Cyber Security. (2022). National cyber threat assessment. https://www.cyber.gc.ca/sites/default/files/ncta-2023-24-web.pdf.
- Gopal, P. R. C., Rana, N. P., Krishna, T. V., & Ramkumar, M. (2024). Impact of big data analytics on supply chain performance: an analysis of influencing factors. Annals of Operations Research, 333(2), 769-797.
- Ogbuke, N. J., Yusuf, Y. Y., Dharma, K., & Mercangoz, B. A. (2022). Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Production Planning & Control, 33(2-3), 123-137.
- Collier, Z. A., & Sarkis, J. (2021). The zero trust supply chain: Managing supply chain risk in the absence of trust. International Journal of Production Research, 59(11), 3430-3445.
- National Institute of Standards and Technology. (2020). Zero trust architecture. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).