liu.seSearch for publications in DiVA
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations
FOI, Sweden.
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering. (AEGIS)
Linköping University, Department of Computer and Information Science, Database and information techniques. Linköping University, Faculty of Science & Engineering. (AEGIS)ORCID iD: 0000-0002-9829-9287
2025 (English)In: 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France: IEEE, 2025, p. 1-6Conference paper, Published paper (Refereed)
Abstract [en]

Traditional perimeter-based security models, which implicitly trust internal networks, are vulnerable to modern cyber threats such as ransomware and credential misuse, allowing lateral movement and large-scale breaches. Zero Trust Architecture (ZTA) mitigates these risks by enforcing continuous authentication and least-privilege access for all devices. However, organizations face challenges in adopting ZTA without disrupting operations or incurring high costs, and existing research lacks actionable guidance. Through extensive literature analysis, semi-structured interviews with diverse organizational staff, and evaluation of Zero Trust maturity across seven pillars, this article proposes a practical, phased roadmap tailored to the needs of an organization. The approach prioritizes operational continuity and minimizes implementation barriers, enabling robust and sustainable cybersecurity.

Place, publisher, year, edition, pages
Avignon, France: IEEE, 2025. p. 1-6
Keywords [en]
Micro-Segmentation, Network Security, Operational Continuity, Phased Implementation, Zero Trust Architecture (ZTA)
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:liu:diva-219042DOI: 10.1109/CNS66487.2025.11194934ISBN: 9798331538569 (electronic)ISBN: 9798331538576 (print)OAI: oai:DiVA.org:liu-219042DiVA, id: diva2:2009092
Conference
IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025
Available from: 2025-10-27 Created: 2025-10-27 Last updated: 2025-10-30

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records

Singh Gaba, GurjotGurtov, Andrei

Search in DiVA

By author/editor
Singh Gaba, GurjotGurtov, Andrei
By organisation
Database and information techniquesFaculty of Science & Engineering
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 16 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf