Preprint Article Version 1 This version is not peer-reviewed

Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations

Version 1 : Received: 16 July 2024 / Approved: 17 July 2024 / Online: 18 July 2024 (08:23:51 CEST)

How to cite: Dakic, V.; Moric, Z.; Kapulica, A.; Regvart, D. Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints 2024, 2024071454. https://doi.org/10.20944/preprints202407.1454.v1 Dakic, V.; Moric, Z.; Kapulica, A.; Regvart, D. Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations. Preprints 2024, 2024071454. https://doi.org/10.20944/preprints202407.1454.v1

Abstract

The Zero Trust Architecture (ZTA) security system follows the "never trust, always verify" principle. The process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA to enforce strict identity verification and access rules across the cloud environment to improve security. Implementation is time-consuming and difficult. Azure's extensive services and customizations require careful design and implementation. Azure administrators struggle to navigate and change configurations due to its complex user interface (UI). Each Azure ecosystem component must meet ZTA criteria. ZTA's comprehensive policy definitions, multi-factor and pass-wordless authentication, and other advanced features are tested in a mid-size business scenario. These configuration changes require a solid grasp of Azure's architecture and Zero Trust. Implementing an Azure ZTA reduces vulnerabilities and restricts authorized users' access to critical resources. Implementation is time-consuming and expensive, requires a significant commitment to changing IT procedures, and can be confusing because the same features are available in multiple places. Azure ZTA has shown great potential for both hybrid and cloud-native companies.

Keywords

security; cybersecurity; Zero Trust Architecture; ZTA; Azure ZTA; multi-factor authentication; micro-segmentation

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.