Abstract
The “Trust but Verify” principle, which majority of enterprises follow, would need to be revamped. It is agreed that the problems resulting from the “Trust but Verify” principle can be addressed using the Zero Trust principles alongside a risk-driven enterprise security approach. Despite the importance and increasing popularity of Zero Trust, it is still not widely adopted by many organizations. This is because adopting and enforcing the principles and mechanisms behind Zero Trust are unclear. The majority of the work done in this space is industrial and usually customized and scoped to address specific enterprise business requirements. We believe Zero Trust adoption must not be homogeneous across all types of organization, neither it should be scoped to component level. The adoption should rather get processed within an enterprise security architecture framework and should consider the security maturity of an organization. In this paper, we do not cover the mechanisms for implementing Zero Trust; but rather propose, based on our practical experience, the different possible classifications of organization security maturity and the various approaches for Zero Trust Adoption. We then map the proposed approach of Adopting Zero Trust to the classified organizations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Abbadi, I.M.: Cloud Management and Security. Wiley, Hoboken (2014)
Abbadi, I.M., Martin, A.P.: Trust in the cloud. Inf. Secur. Tech. Rep. 16(3–4), 108–114 (2011). https://doi.org/10.1016/j.istr.2011.08.006, https://doi.org/10.1016/j.istr.2011.08.006
Alawneh, M., Abbadi, I.M.: Sharing but protecting content against internal leakage for Organisations. In: Atluri, V. (ed.) DBSec 2008. LNCS, vol. 5094, pp. 238–253. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-70567-3_19
Alawneh, M., Abbadi, I.M.: Integrating trusted computing mechanisms with trust models to achieve zero trust principles. In: The 9th International Conference on Internet of Things: Systems, Management and Security (IOTSMS) (2022)
Buck, C., Olenberger, C., Schweizer, A., Völter, F., Eymann, T.: Never trust, always verify: a multivocal literature review on current knowledge and research gaps of zero-trust. Comput. Secur. 110, 102436 (2021). https://doi.org/10.1016/j.cose.2021.102436, https://www.sciencedirect.com/science/article/pii/S0167404821002601
Cunningham, C.: A look back at zero trust: Never trust, always verify (2020). https://www.forrester.com/blogs/a-look-back-at-zero-trust-never-trust-always-verify/
D’Silva, D., Ambawade, D.D.: Building a zero trust architecture using kubernetes. In: 2021 6th International Conference for Convergence in Technology (I2CT), pp. 1–8 (2021). https://doi.org/10.1109/I2CT51068.2021.9418203
Embrey, B.: The top three factors driving zero trust adoption. Comput. Fraud Secur. 2020(9), 13–15 (2020). https://doi.org/10.1016/S1361-3723(20)30097-X, https://www.sciencedirect.com/science/article/pii/S136137232030097X
Gartner: What is cybersecurity mesh? (2022). https://www.gartner.com/en/conferences/na/security-risk-management-us/conference-resources/cybersecurity-mesh
Iosif, A.C., Gasiba, T.E., Zhao, T., Lechner, U., Pinto-Albuquerque, M.: A large-scale study on the security vulnerabilities of cloud deployments. In: Wang, G., Choo, K.K.R., Ko, R.K.L., Xu, Y., Crispo, B. (eds.) Ubiquitous Secur., pp. 171–188. Springer Singapore, Singapore (2022). https://doi.org/10.1007/978-981-19-0468-4_13
SABSA: SABSA enterprise security architecture (2022). https://sabsa.org
SecurityWeek: Best practice: Can you really define ’best’ security? (2012). https://www.securityweek.com/best-practice-can-you-really-define-best-security
Stack, T.: When is good enough good enough? meeting compliance without losing your mind (2022). https://www.threatstack.com/blog/is-good-enough-good-enough-meet-compliance-without-losing-your-mind
Syed, N.F., Shah, S.W., Shaghaghi, A., Anwar, A., Baig, Z., Doss, R.: Zero trust architecture (ZTA): A comprehensive survey. IEEE Access 10, 57143–57179 (2022). https://doi.org/10.1109/ACCESS.2022.3174679
ca technologies: Regulatory compliance is irrelevant\(\ldots \) or is it?(2018). https://docs.broadcom.com/doc/regulatory-compliance-is-irrelevant-or-is-it
Teerakanok, S., Uehara, T., Inomata, A.: Migrating to zero trust architecture: reviews and challenges. Secur. Commun. Netw. 2021, 1–10 (2021). https://doi.org/10.1155/2021/9947347
Yan, X., Wang, H.: Survey on zero-trust network security. In: Sun, X., Wang, J., Bertino, E. (eds.) Artif. Intell. Secur., pp. 50–60. Springer Singapore, Singapore (2020)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Alawneh, M., Abbadi, I.M. (2023). Approaches for Zero Trust Adoption Based upon Organization Security Level. In: Wang, G., Choo, KK.R., Wu, J., Damiani, E. (eds) Ubiquitous Security. UbiSec 2022. Communications in Computer and Information Science, vol 1768. Springer, Singapore. https://doi.org/10.1007/978-981-99-0272-9_36
Download citation
DOI: https://doi.org/10.1007/978-981-99-0272-9_36
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-0271-2
Online ISBN: 978-981-99-0272-9
eBook Packages: Computer ScienceComputer Science (R0)