Version 1
: Received: 16 July 2024 / Approved: 17 July 2024 / Online: 18 July 2024 (08:23:51 CEST)
How to cite:
Dakic, V.; Moric, Z.; Kapulica, A.; Regvart, D. Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints2024, 2024071454. https://doi.org/10.20944/preprints202407.1454.v1
Dakic, V.; Moric, Z.; Kapulica, A.; Regvart, D. Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints 2024, 2024071454. https://doi.org/10.20944/preprints202407.1454.v1
Dakic, V.; Moric, Z.; Kapulica, A.; Regvart, D. Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints2024, 2024071454. https://doi.org/10.20944/preprints202407.1454.v1
APA Style
Dakic, V., Moric, Z., Kapulica, A., & Regvart, D. (2024). Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints. https://doi.org/10.20944/preprints202407.1454.v1
Chicago/Turabian Style
Dakic, V., Ana Kapulica and Damir Regvart. 2024 "Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations" Preprints. https://doi.org/10.20944/preprints202407.1454.v1
Abstract
The Zero Trust Architecture (ZTA) security system follows the "never trust, always verify" principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cloud environment to improve security. Implementation is time-consuming and difficult. Azure's extensive services and customizations require careful design and implementation. Azure administrators struggle to navigate and change configurations due to its complex user interface (UI). Each Azure ecosystem component must meet ZTA criteria. ZTA's comprehensive policy definitions, multi-factor and pass-wordless authentication, and other advanced features are tested in a mid-size business scenario. These configuration changes require a solid grasp of Azure's architecture and Zero Trust. Implementing an Azure ZTA reduces vulnerabilities and restricts authorized users' access to critical resources. Implementation is time-consuming and expensive, requires a significant commitment to changing IT procedures, and can be confusing because the same features are available in multiple places. Azure ZTA has shown great potential for both hybrid and cloud-native companies.
Computer Science and Mathematics, Security Systems
Copyright:
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.