A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations
2025 (English)In: 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France: IEEE, 2025, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]
Traditional perimeter-based security models, which implicitly trust internal networks, are vulnerable to modern cyber threats such as ransomware and credential misuse, allowing lateral movement and large-scale breaches. Zero Trust Architecture (ZTA) mitigates these risks by enforcing continuous authentication and least-privilege access for all devices. However, organizations face challenges in adopting ZTA without disrupting operations or incurring high costs, and existing research lacks actionable guidance. Through extensive literature analysis, semi-structured interviews with diverse organizational staff, and evaluation of Zero Trust maturity across seven pillars, this article proposes a practical, phased roadmap tailored to the needs of an organization. The approach prioritizes operational continuity and minimizes implementation barriers, enabling robust and sustainable cybersecurity.
Place, publisher, year, edition, pages
Avignon, France: IEEE, 2025. p. 1-6
Keywords [en]
Micro-Segmentation, Network Security, Operational Continuity, Phased Implementation, Zero Trust Architecture (ZTA)
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-219042DOI: 10.1109/CNS66487.2025.11194934ISBN: 9798331538569 (electronic)ISBN: 9798331538576 (print)OAI: oai:DiVA.org:liu-219042DiVA, id: diva2:2009092
Conference
IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025
2025-10-272025-10-272025-10-30