1. Introduction
In a time where rapidly evolving threats – bolstered by advancements in technologies like artificial intelligence – pose substantial danger to organizational well-being, it is critical to adopt advanced security solutions to protect assets. Conventional methods of security are no longer sufficient, in isolation, to ensure organizational cybersecurity. Multifaceted approaches, which consider each element of an organization as a potential vulnerability, are requisite. Enter zero-trust cybersecurity, a security paradigm that embraces a zero-trust philosophy: in order to limit vulnerabilities, there is no default trust that any person or object within a network is what it claims or should have access to unnecessary segments of the network [
1]. This philosophy means that all users must continuously provide evidence that they are who they claim (e.g., through multi-factor authentication) and access is limited to only that information that is position critical.
Organizations where large amounts of information are regularly exchanged and private records are secured – such as schools and libraries – are especially at risk from cyber threats. Recently, the Toronto Public Library fell victim to a cyberattack that hijacked its systems and data for months, crippling the organization’s ability to function properly and threatening patron privacy [
2]. In these organizations, zero-trust cybersecurity practices may offer a way to remain resilient in the face of increasing threats. The purpose of this paper is to discuss how zero-trust cybersecurity principles may be integrated into learning and information organizations, to preserve the sanctity of these organizations’ information and records.
2. Principles of Zero-Trust Cybersecurity
In 2005, the Jericho Forum, a group of security experts, proposed a new approach to network security. Unlike the traditional method, which relied on firewalls to control traffic and address internal threats, this approach marked a significant departure from the established security model that emphasized a defined perimeter [
3]. Building on these ideas, cybersecurity expert John Kindervag coined the term "zero trust" in 2010 while working at Forrester Research [
3]. The zero trust model operates on the assumption that systems will inevitably be compromised, and therefore, no entities—internal or external—should be automatically trusted. Instead, every request for resource access must be authenticated, authorized, and continuously validated before granting access [
4].
2.1. Never Trust, Always Verify
The separation of trust from location is the core of zero-trust. The most significant difference between zero-trust and traditional security boundaries is that, in traditional models, trust is often based on location [
5]. In the traditional security model, once a user, device, application, or process is granted access to a network or resource, they typically have unrestricted access. The model assumes that everything in the network is inherently trusted [
5]. However, the current framework of static rule sets, firewalls, VPNs, and subnets can lead to severe vulnerabilities [
6]. First, there is often a lack of control or segmentation within the internal network, which means once an intruder or malicious insider breaches the perimeter defense and gains access to the internal network, they can easily move laterally, accessing sensitive data and resources without further checks [
7]. Second, intruders can exploit poorly protected devices or applications as entry points into the internal network. In this scenario, the security of the entire internal network can be compromised by the weakest link, making the network highly vulnerable [
6]. Third, the current architecture typically establishes connections through devices and services with known external IP addresses before verifying access, which makes the network susceptible to potential exploits targeting the initial connection points, increasing the risk of unauthorized access or network disruption [
8]. Fourth, centralized log servers pose another vulnerability. Since log files are stored in one location, intruders who gain access to the log servers can potentially disguise their activities and clear their tracks by altering or deleting long entries [
9].
In contrast, the zero-trust framework emphasizes that network location does not imply trust. It assumes that all network traffic, devices, applications, and processes are potentially malicious and untrustworthy, constantly validating everything inside and outside the network [
9]. A key component of the model is the emphasis on authentication and the recognition that authentication is critical to network access control [
10]. The approach to authentication has evolved from simple password-given systems to more sophisticated Multi-Factor Authentication (MFA) techniques, enhancing security by requiring multiple authentication forms and reducing the risk associated with weak or compromised credentials [
11,
12]. The technique requires multiple authentication parts to authenticate the user, such as an SMS or phone call prompt or an authenticator application. For MFA administrators, on the other hand, it helps verify who is active on the system and identify hackers [
13].
Implementing MFA with digital certificates and tokens for devices and applications is another critical aspect of a robust security strategy. Certificates issued by a trusted certificate authority establish the identity of a device or application. When a device or application connects to a network or service, it presents its certificate, which the certificate authority verifies, ensuring that only authorized entities can access the network and preventing unauthorized access [
14]. The token can be a physical device like a USB key and smart card, or a software token running on a smartphone, which enhances security further. Hardware tokens generate a one-time password or provide encryption keys when connected to a device (West, 2013). Software tokens generate one-time passwords or authenticate users or devices using encryption algorithms. Tokens add a vital layer of security by requiring the processing of a physical device or access to a specific application, dramatically reducing the risk of unauthorized access through stolen or guessed passwords [
15].
2.2. Implement the Least Privilege
Implementing the principle of least privilege is another core principle of the zero-trust framework [
16]. It requires that users, applications, and systems have the minimum level of access to resources and data to perform the functions by employing strategies for monitoring user behaviors, verifying device IDs, and implementing dynamic authorization, which adjusts access in real-time based on the context and behavior of users or devices [
16,
17]. The principle is crucial for reducing the attack surface within an organization network, as it limits the potential pathways an attacker could exploit. The organization significantly decreases the risk of unauthorized access and potential data breaches by ensuring limited authentication. The approach enhances security and simplifies access management by clearly defining and enforcing boundaries for each role and device within the network [
18].
Role-based access control is a foundational mechanism for achieving the principle of least privilege by assigning permissions based on specific roles. This approach simplifies user authorization management and reduces the possibility of unauthorized and excessive access, thereby preventing security vulnerabilities [
19,
20]. However, the traditional role-based access control model has certain limitations. For instance, once permissions and roles are assigned, they remain static until manually updated by an administrator, preventing dynamic permissions adjustment. Furthermore, changes in system scale or business logic often require the creation of numerous roles to maintain user-role relationships, leading to a phenomenon known as role explosion [
21]. [
22] emphasize that a trust-based control process model can enhance security with role-based access control by incorporating user behavior trust. For instance, a user profile is generated by extracting valid features from user behaviors and attributes, such as login mode, time, duration, device, and IP address. By analyzing the anomaly and security degree of each feature of the user’s behavior and attributes and comparing the user profile with current behavior, the system can detect deviations from historical behavior, allowing for the dynamic adjustment of the user’s trust level and the identification of abnormal users and behaviors [
22].
Network segmentation is another critical principle of least privilege, emphasizing the division of network entities into smaller subnets to minimize attackers’ potential for lateral movement [
23]. The segmentation process involves several stages: grouping resources within each segment, defining short leases within the subnet by implementing the network typology, and establishing access control between the segments [
24]. By default, links between instances within the same segment are considered reliable [
25]. [
26] categorizes segments into macro-segmentation and micro-segmentation. Marco segmentation involves grouping multiple resources within each segment to ensure they can be collectively secured. In contrast, micro-segmentation places resources within each segment so that there is typically one, but occasionally several, highly protected resources within a single segment [
26]. Marco-segmentation enhances performance and reduces costs by simplifying network management, decreasing the complexity of protecting numerous small segments, and optimizing the use of network resources. Conversely, more granular access control, such as micro-segmentation, can improve reliability and security by implementing zero-trust principles across different segments [
23]. Therefore, it is crucial to balance the benefits of macro- and micro-segmentation with the need for efficient communication within the network [
27,
28].
2.3. Assume Breach and Plan for the Worst
Despite the robust data security measures, a system can only be guaranteed to be utterly breach-proof if taken offline [
29]. The reality necessitates a comprehensive approach to monitoring all access-related entities, such as data streams, devices, services, and files, collecting as much environmental information as possible to enhance the reliability of security assessment, increase the credibility organizations should conduct thorough risk assessments to identify potential threats and vulnerabilities within their infrastructure, including potential attack vectors and likelihood of successful attack [
30]. Organizations should develop a business continuity plan outlining specific actions and protocols (e.g., establishing clear communication channels, designating responsibilities and roles, and ensuring data backup and recovery processes) to maintain critical operations during and after a breach based on the risk assessments to prepare for worst-case scenarios. The scope of risk assessment can vary depending on the specific use case, but utilizing well-prepared templates built on best practices can ensure comprehensive evaluations regardless of scope [
30]. Additionally, a risk assessment should be carried out every time the environment changes, such as by implementing new technologies, expanding or restructuring the network, integrating third-party services, or adopting new business processes. The changes introduce new vulnerabilities and alter the risk landscape. Organizations can identify and mitigate potential risks by performing a risk assessment before they are exploited, ensuring that security measures are always aligned with the current operational environment and helping to maintain a robust security posture [
31].
3. Issues for Implementing Zero-Trust
3.1. Insider Threat Management
Insider threat is one of the critical risks posed by individuals within the organization [
31]. It is generally considered a top security concern in any organization, and also managing this inside threat is a critical component of Zero-Trust cybersecurity [
33]. These threats can arise from current and former employees, contractors, business partners with legitimate access to the network and systems, or even cloud-computing vendors[
34]. In this situation, adopting the principle of "never trust, always verify" is essential in managing inside threats. Zero-trust cyber security can be applied effectively through continuous monitoring, strict access controls, and training for potential breaches [
35,
36].
3.2. Continuous Monitoring
The first step in managing insider threats is identifying potential threats and monitoring activities within the organization. Insiders are considered "Trusted" people, so This involves deploying sophisticated tools and techniques to detect anomalies and unusual behaviors that could indicate malicious intent or risky actions [
37]. According to [?], insider threat mitigation includes all types of technology to alert, monitor, notify, and report on activities that occur on a network. For example, this involves deploying user behavior to monitor and analyze user activities continuously. Monitoring the behaviors and ensuring that these infiltrations are unsuccessful is a behavioral analysis goal for insider threat mitigation [
38]. It uses machine learning algorithms to establish normal behavior patterns and detect deviations that may indicate malicious intent or risky actions [
39,
40].
3.3. Access Controls and Least Privilege
Implementing least-privilege security is another cornerstone of inside threat management [
32,
33]. Suppose a user has excessive privileges, or a company did not map user privileges against their actual accesses. In that case, it may be hard to identify who accessed or allowed a user to sabotage the whole system [
33]. To reduce this problem, well-defined Role-based access control (RBAC) ensures that users have only the permissions necessary for their roles, reducing the risk of unauthorized access [
32,
33]. Regular reviews and audits of access rights are also crucial to maintaining compliance and security [
32,
33].
3.4. Training and Awareness
Human error and lack of awareness are significant contributors to insider threats. Therefore, training and awareness programs are essential components of inside threat management [
32,
33]. Educating employees about the importance of cybersecurity and how to recognize and respond to potential threats can significantly reduce risks. Conducting regular training sessions on cybersecurity best practices, such as recognizing phishing attempts, proper use of passwords, and secure handling of sensitive data, can enhance employees’ ability to prevent and respond to security incidents.
3.5. Customers/Users/Patrons
Often one of the greatest potential vulnerabilities for an organization is not technology or even internal employees, but rather the customers, users, or patrons who interact with the organization. Data is constantly being exchanged between the organization and its users. These individuals must simultaneously be viewed as subjects of cyberthreats as well as potential causes of cyberthreats – access must be balanced with ensuring control and security. Most members of the general public are woefully underprepared to prevent or address emerging cyberthreats if targeted [
41,
42]. One factor that appears important is whether the users have a stake in the technology they are using and the data that is being shared, as they are likely to be more protective of data on personal devices [
43]. Another factor is whether they have ever received formal instruction about cyber security behavior, which has been shown to produce better security behavior [
44]. Transparency with users as to why new cybersecurity plans and procedures – some of which may seem inconvenient – are being implemented is key to earning buy-in [
45].
3.6. Cybersecurity Awareness for Customers/Users/Patrons
Ensuring that users are well-informed about the risks associated with interacting with the organization and systems, in general, is a critical dimension for shoring up this vulnerability. Training should highlight the justifications for new procedures, clearly outline what the procedures are, and provide examples and activities, as needed, to reinforce the procedures. For instance, an organization may offer exercises to highlight new procedures for multi-factor authentication or how to handle potential social engineering attacks [
46]. Training could be formal (content the user must learn before they can access a system) or informal (reminders about best practices for cybersecurity) and may include targeted approaches aimed at particularly vulnerable user populations [
47]. Organizations may seek to strike a balance between the potential costs of cyberthreats and the costs of training the public. The different approaches to cybersecurity awareness training that exist today provide options for the organization to consider [
48].
3.7. User-Focused Solutions
Users are not experts in cybersecurity. They very well may not even be familiar with the systems in use within an organization. Thus, it is critical to meet the users where they are in terms of knowledge and ability. Systems that are designed with high usability are less likely to engage in system behavior that could leave the organization susceptible to threats [
49]. Clear policy surrounding the use of these systems will further support these security initiatives [
50]. A Zero-Trust architecture will naturally support greater security, but it too needs buy-in, given the amount of change it may require [
51]. Incorporating feedback from actual users may help support this process.
3.8. Hybrid Cloud Protection
Hybrid cloud environments, which integrate on-premises infrastructure with public and private cloud services, pose unique security challenges. Implementing Zero-Trust in these settings necessitates a comprehensive strategy to protect data, applications, and infrastructure across all platforms. The Zero-Trust Cybersecurity principle of "never trust, always verify" is essential for securing hybrid clouds. Unlike on-premises infrastructure, cloud systems are external to the organization. Numerous stakeholders and components are involved between the cloud vendor and the organization utilizing the cloud service.
3.9. Challenges in Hybrid Cloud Security
While hybrid cloud environments offer flexibility and scalability, they also introduce complexities in security management. Many researchers have identified the biggest challenges in cloud computing, including security and privacy (secure data storage, data confidentiality, accountability, and data encryption), high-speed access to the Internet, lack of audit features, portability, interoperability, linkage, organizational sustainability, and standardization, as well as maintaining consistent security policies across different environments, managing access controls, securing data both in transit and at rest, and ensuring visibility, privacy, and control over all components [
52]. [
53] emphasize that the major challenge in the adoption of the cloud is security and these challenges require a robust security framework that integrates seamlessly across on-premises and cloud platforms, ensuring consistent policy enforcement and threat detection. The "never trust, always verify" principle is especially vital in hybrid cloud environments. Every access request, regardless of its origin, must be continuously authenticated and authorized. The dynamic nature of hybrid clouds, characterized by frequent data transfers between on-premises and cloud services, complicates security management further. To address these challenges effectively, organizations must adopt advanced technologies and strategies [
54].
3.10. Implementing a Security Framework
Adopting a robust security framework is essential for deploying Zero-Trust in hybrid cloud environments. This framework should incorporate security policies, processes, and technologies to ensure uniform protection across all platforms. The National Institute of Standards and Technology (NIST) offers a comprehensive framework for managing cybersecurity risks, suitable for hybrid cloud settings. The NIST Cybersecurity Framework includes six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. These functions offer a structured approach to managing cybersecurity risks and applying Zero-Trust principles [
55]. Organizations should adapt the NIST framework to their unique needs, integrating best practices and industry standards [
32,
33]. In addition, Service level agreements (SLAs) play a crucial role in managing security in hybrid cloud environments by defining the performance and security standards that cloud service providers must meet. These agreements help manage customer expectations and outline the circumstances under which providers are not liable for outages or performance issues. While SLAs represent the performance characteristics of services and facilitate comparisons, they do not guarantee service quality or eliminate the risk of selecting a poor service provider. Typically, an SLA includes a statement of objectives, a list of services covered, and the responsibilities of both the service provider and the customer. Key considerations in SLAs include robust data encryption, comprehensive monitoring, and threat detection capabilities, clearly defined incident response protocols, and compliance with industry standards and regulatory requirements. By including these provisions, organizations can ensure that their hybrid cloud environments remain secure and that service providers are held accountable for their security practices [
56].
3.11. Data Protection
Cloud computing environments are characterized by diverse, sparsely distributed nodes that are often difficult to control effectively. Data protection in cloud computing encompasses several critical areas, including encryption, access control, and trust management [
57]. Data encryption is vital for ensuring the confidentiality and integrity of data in hybrid cloud environments. Encrypting data in transit and at rest keeps sensitive information secure even if intercepted or accessed without authorization [
32]. While cloud providers offer various encryption services, organizations must securely manage encryption keys to prevent unauthorized access. Implementing end-to-end encryption, where data is encrypted before transmission and decrypted only by authorized recipients, further enhances security [
33]. The integration of encryption and access control with trust management further enhances data protection in cloud computing. Trust models can be incorporated into encryption schemes to evaluate and ensure the reliability of users and service providers. This holistic approach to data protection not only secures data but also maintains the integrity and availability of cloud services, thereby fostering a trustworthy computing environment [
57].
3.12. Privacy
Cloud computing environments face numerous privacy challenges due to the technology’s inherent nature. The risk of privacy breaches escalates as data is transmitted, processed, and stored by cloud service providers (CSPs). This occurs because any security vulnerabilities in existing technologies are carried over to the cloud platform, amplifying potential security threats [
57]. According to the Cloud Security Alliance (CSA) and other scholarly sources, key privacy threats in cloud computing include data disclosure, access rights management issues, and difficulties in data destruction [
58]. Virtualization in cloud services also introduces privacy challenges, as attacks among virtual machines can happen despite isolation strategies. Additionally, multi-tenant and cross-domain sharing can complicate service authorization and access control, increasing the risk of unauthorized access and data breaches [
57,
59]. Addressing privacy concerns in cloud computing requires a multi-faceted approach that incorporates advanced technologies, robust policies, and best practices [
60,
61]. According to [
60] that reduce data privacy problems, organizations should ensure they know the logical and physical location of their data, including the state, country, and specific data center, to address potential regulatory, contractual, and jurisdictional issues; Establishing location and jurisdictional policies to govern data location is essential; Intelligent data segregation techniques should be adopted to separate data from different users effectively; using strong encryption techniques for backup data is crucial to prevent data leakage.
3.13. Monitoring and Detection
Comprehensive visibility and real-time threat detection are crucial for managing security in any networked system including hybrid cloud environments [
32,
33,
55]. Continuous monitoring and advanced detection capabilities allow organizations to promptly identify and respond to threats. For example, Security Information and Event Management (SIEM) systems are vital in this process [
33]. SIEM solutions collect and analyze logs and events from various sources within the hybrid cloud environment, providing a complete view of security activities. By correlating events and identifying patterns indicative of malicious behavior, SIEM systems facilitate rapid threat detection and response. Cloud Security Posture Management (CSPM) tools automate the assessment of cloud security configurations, identifying potential vulnerabilities and ensuring compliance with security policies [
62]. CSPM solutions continuously monitor cloud environments for misconfigurations and deviations from best practices, helping organizations maintain a secure posture.
3.14. Access Controls and Least Privilege
Implementing access controls and the principle of least privilege is fundamental to securing cloud environments. This approach involves granting users only the permissions necessary to perform their tasks, thus minimizing the risk of unauthorized access and data breaches. To ensure data confidentiality and integrity, organizations must utilize advanced encryption techniques for data in transit and at rest, while securely managing encryption keys through key management services [
33,
57]. In addition, advanced authentication protocols such as anonymous two-factor user authentication and dynamic reciprocal authentication offer secure mutual authentication, protecting against phishing and man-in-the-middle attacks [
63,
64]. Smart virtual cards and blockchain technology provide additional layers of security by ensuring the integrity and authenticity of transactions [
65]. Furthermore, machine learning-based intrusion detection systems, like those using support vector machines (SVM) and information gain (IG), improve the accuracy and speed of detecting malicious activities, thereby enhancing overall cloud security [
66]. The Mobile Cloud Intrusion Detection and Prevention System (MINDPRES) leverages machine learning to dynamically analyze network traffic and device resources, providing robust protection against intrusions [
67]. These combined strategies form a comprehensive approach to securing cloud environments and protecting sensitive data.
4. Contextual Differences in Zero-Trust Cybersecurity
Importantly, the appearance of zero-trust implementation may differ based on context. A for-profit organization with few customers will look distinct from a public library. Both organizations need a high-level of security as common targets of attacks, but the threats for a small organization with few customers (likely external threat) are different from those of a library with many public users. Additionally, the targets of attacks may differ. A for-profit organization may be attacked for financial information, whereas a public library may be attacked for patron data or to hijack systems for ransom. These factors are all important in the design of the zero-trust architecture. The following sections explore several unique contexts in detail.
4.1. The University Environment
Institutions of Higher Education (IHEs) hold access to protected information not only about employees (e.g., social security numbers), but also thousands of students. A breach of this information could not only cause irreparable damage to the reputation of the institution and put students and employees at risk but make the institution criminally liable for failing to protect these parties’ information [
68]. Obviously, this would come with severe direct and indirect impacts on the institution’s financial standing and public trust. Given these consequences, preserving security at all costs is vital.
Many colleges and universities already utilize strategies like multi-factor authentication to prevent hacking, but one can argue that these measures are insufficient. There are many systems within universities that hold very sensitive information and yet are accessible to lower-level employees like part-time and student workers [
69]. Employees at all levels regularly access systems from different locations around campus – an instructor could easily forget to log out of a classroom computer station. The vulnerabilities are practically boundless. Zero-trust solutions may provide an answer to protect these valuable higher education resources.
Here are a few examples of how zero-trust can support cybersecurity in higher education:
Zero-trust can limit access to only the information employees need when they need it [
70]. For instance, it is possible a student employee may need to access student records in the course of their work, but they have no legitimate rationale to have access to this information outside of work hours and their workstation.
Faculty members have substantial amounts of information, including student grades and funding accounts, that must be protected [
71]. When they leave a computer station unattended – such as in a classroom when they leave to use the restroom – they create a vulnerability. Session timeouts can protect these workstations by locking the computer and requiring a fresh log-in to access the station again. While this solution may cause frustration for some faculty members, it may also prevent a major breach.
Students require access to many systems, offering a slightly different dynamic where they must share large amounts of private information but have limited access to the stored information of others [
72]. Permissions must be managed to protect students from their own peers.
5. The Library Environment
Libraries hold immense stores of information in the form of the copyrighted physical and digital works they lend to patrons, the access they afford to the Internet, and the data they possess about their patrons [
73]. All of this information is potentially valuable to attackers. If, for instance, a hacker gains access to patrons’ sensitive information, they could hold it for ransom, like with Toronto Public Libraries. As with institutions of higher education, libraries present unique challenges by having both employee and patron/user populations to manage as far as cyberthreats [
74].
Within libraries, patrons must have access to their own data and data about library resources, but not data pertaining to other patrons. Front-line library workers must have some ability to look up information but do not usually need access to information about other aspects of internal library operations or fellow employees. Administrators, however, need access to wide-ranging data. This necessitates varying levels of permissions based on an individual’s credentials [
75]. Fortunately, this mandate is built directly into zero-trust cybersecurity. Additional ways that zero-trust may support cybersecurity in libraries include:
Protecting patrons against invasions of privacy by authorities could be supported by zero-trust measures. Historically, library records have been a target of police, who might use them to monitor patron behavior. The American Library Association, the leading organization for libraries, strongly opposes this activity and supports practices that restrict these efforts [
76]. Nonetheless, it can be intimidating for an unprepared front-line library worker if confronted by law enforcement. A zero-trust system could prevent these officials from easily gaining access to this information from a front-line employee, forcing them to follow the prescribed path of receiving a warrant and communicating with the library director.
As with the case of an instructor who leaves a computer unattended, session timeouts can be used to secure employee workstations to ensure no unmonitored patrons gain access to unauthorized information [
77].
6. The Supply Chain Environment
A supply chain encompasses entities directly providing and distributing products, services, funds, and information from origin to destination [
78]. In contemporary society, supply chains are integral to daily life, facilitating the delivery of essential items such as water, food, healthcare, medications, and energy resources [
79]. Supply Chain Management covers critical functions, including comprehensive planning, sourcing, production, delivery, and returns management [
80]. However, the extensive interconnections among stakeholders, technologies, and geographic locations in contemporary supply chain systems introduce vulnerabilities malicious actors can exploit [
81]. Additionally, the emergence of big data has led to exponential growth in data across the supply chain, encompassing information from procurement, production, distribution, and customer interaction, which increases data security complexity [
82]. Big data analytics provides valuable insights for optimizing operations, predicting demand, and enhancing the customer experience. Meanwhile, it broadens the attack surface and makes organizations vulnerable to potential breaches, particularly identity-based attacks such as theft or misuse of user credentials, privileges, or personal information. The vast amount of data flowing through the supply chain can be challenging to monitor and secure, and participants accessing large data sets may inadvertently or intentionally misuse or disclose sensitive information, exacerbating security challenges [
83].
Achieving zero-trust in the supply chain involves developing comprehensive, enterprise-wide security plans and strategies [
84]. The plans address the intricate relationships between upstream and downstream stakeholders, flows of material, information, and finances, and access transaction strategies. Unlike the IT field, the supply chain encompasses technical systems and complex processes, individuals, and relationships, all requiring careful consideration and attention [
84]. Based on the [
85] zero-trust architecture guideline, Collier and Sarkis (2011) proposed the following transitional steps for implementing zero-trust in the supply chain:
Supply chain organizations need to identify participants and boundaries, distinguish between internal and external participants (including suppliers, clients, and internal employees), and understand their roles and the level of access required [
84].
Identify supply chain assets by cataloging data, information, and systems within the enterprise, recognizing non-enterprise participants and technologies that interact with the supply chain, and understanding general business processes related to the organization’s mission, such as trust-related processes and contractually mandated procedures for non-enterprise participants, identifying threats posed by participants, assets, and processes, and conducting risk assessments to prioritize zero-trust implementation and its impact on business objectives (Collier & Sarkis, 2021).
During deployment and monitoring, the organization should decide on a deployment strategy, possibly using a trial mode, and gather the necessary data to evaluate success while ensuring the ability to revert to the previous configuration [
84].
Finally, implementing zero-trust involves designing an iterative process that builds on successes and learns from failures, gradually transitioning, adjusting priorities, and incorporating continuous improvement into deployments [
84].
7. Conclusions
Zero-trust cybersecurity has proven to be an essential framework for addressing the complex and evolving threat landscape organizations face today. By shifting from a traditional "trust but verify" approach to "never trust, always verify," zero-trust emphasizes continuous verification, strict access controls, and the assumption that breaches are inevitable [
9]. This paper has explored the core principles of zero-trust, including continuous authentication, least privilege security, and breach assumption. Specific steps for implementing zero-trust, with a detailed focus on inside threat management and hybrid cloud protection, have been examined, alongside the unique challenges and strategies for different environments such as libraries, universities, and warehouses.
Understanding contextual differences in Zero-Trust cybersecurity is essential for effective implementation. In university environments, where diverse user groups and open networks are prevalent, securing research data, protecting student information, and ensuring secure access to educational resources is paramount. In the library environment, the focus should be on protecting patron data, securing public access computers, and ensuring the integrity of digital resources. Warehouses, relying heavily on automation and IoT devices, require strategies to secure IoT devices, protect inventory data, and ensure physical security. By tailoring Zero-Trust strategies to these specific environments, organizations can enhance their security posture and better protect their data, systems, and users from evolving cyber threats. While integrating these principles may be frustrating at first for some workers accustomed to fewer restrictions, protecting one’s organization is of paramount importance.
Future research may focus on developing advanced, user-friendly security analytics tools that leverage artificial intelligence and machine learning for real-time threat detection and response. More efficient and cost-effective Zero-Trust implementation methods should be explored, especially for small and medium-sized enterprises. Specific Zero-Trust strategies tailored to data-rich and information-rich contexts is necessary. The evolving landscape of remote work and hybrid cloud environments also warrants ongoing research to identify best practices and innovative solutions. Another critical area for future study is to balance security measures with usability to ensure that security protocols do not hinder organizational efficiency or user satisfaction. Longitudinal studies examining Zero-Trust implementations’ long-term effectiveness and adaptability across various industries would provide valuable insights into the model’s sustainability.
Author Contributions
Conceptualization, Brady Lund, Ziang Wang, and Ting Wang; Formal Analysis, Brady Lund Tae Hee Lee, Ziang Wang, Ting Wang; Writing - Original Draft Preparation, Brady Lund, Tae Hee Lee, Ziang Wang, Ting Wang, Nishith Reddy Mannuru; Writing - Review and Editing, Brady Lund and Nishith Reddy Mannuru. All authors have read and agreed to the published version of the manuscript.
Funding
This research received no external funding
Institutional Review Board Statement
Not applicable.
Conflicts of Interest
The authors declare no conflicts of interest.
References
- Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero trust architecture. NIST Special Publication, 800-207.
- Bridge, S., & Zoledziowski, A. (2024). 1 million books and 4 months later, Toronto’s library recov-ers from a cyberattack. Canadian Broadcasting Corporation. https://www.cbc.ca/news/canada/toronto/toronto-library-ransomware-recovery-1.7126412.
- Kerman, A. (2020). Zero trust cybersecurity: ‘Never trust, always verify.’ https://www.nist.gov/blogs/taking-measure/zero-trust-cybersecurity-never-trust-always-verify.
- Department of Defense. (2022). Zero trust referenced architecture. https://dodcio.defense.gov/Portals/0/Documents/Library/(U)ZT_RA_v2.0(U)_Sep22.pdf.
- Kang, H., Liu, G., Wang, Q., Meng, L., & Liu, J. (2023). Theory and Application of Zero Trust Se-curity: A Brief Survey. Entropy, 25(12), 1595.
- Chen, Y., Hu, H., & Cheng, G. (2019). Design and implementation of a novel enterprise network defense system by maneuvering multi-dimensional network properties. Frontiers of Information Technology & Electronic Engineering, 20(2), 238–252. [CrossRef]
- Assunção, P. (2019). A zero-trust approach to network security. Proceedings of the Digital Privacy and Security Conference, 2019, 65–72.
- Kumar, P., Moubayed, A., Refaey, A., Shami, A., & Koilpillai, J. (2019). Performance Analysis of SDP For Secure Internal Enterprises. 2019 IEEE Wireless Communications and Networking Conference, 1-6. [CrossRef]
- Buck, C., Olenberger, C., Schweizer, A., Völter, F., & Eymann, T. (2021). Never trust, always veri-fy: A multivocal literature review on current knowledge and research gaps of zero-trust. Computers & Security, 110, 102436.
- Rivera, J. J. D., Muhammad, A., & Song, W. C. (2024). Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication. IEEE Open Journal of the Communications Society, 5, 2792-2814.
- Ferrag, M. A., Maglaras, L., Argyriou, A., Kosmanos, D., & Janicke, H. (2018). Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes. Journal of Network and Computer Applications, 101, 55-82.
- Ometov, A., Bezzateev, S., Mäkitalo, N., Andreev, S., Mikkonen, T., & Koucheryavy, Y. (2018). Multi-factor authentication: A survey. Cryptography, 2(1), 1.
- Cunningham, C. (2018). Zero trust. https://go.forrester.com/blogs/next-generation-access-and-zero-trust/.
- Identity Management Institute. (n.d.). Digital identity certificate. https://identitymanagementinstitute.org/digital-identity-certificate/.
- West, M. (2013). Preventing system intrusions. In J. J. Vacca (Eds.), Network and system security (pp. 29-56). Syngress.
- DelBene, K., Medin, M., & Murray, R. (2019). The Road to Zero Trust (Security). DIB Zero Trust White Paper, 9.
- Azad, M. A., Abdullah, S., Arshad, J., Lallie, H., & Ahmed, Y. H. (2024). Verify and trust: A multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 101227.
- Bandari, V. (2023). Enterprise data security measures: a comparative review of effectiveness and risks across different industries and organization types. International Journal of Business Intelligence and Big Data Analytics, 6(1), 1-11.
- Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., & Chandramouli, R. (2001). Proposed NIST standard for role-based access control. ACM Transactions on Information and System Security (TISSEC), 4(3), 224-274.
- Sandhu, R. S. (1995). Role-based access control. IEEE Computer Computers, 29(2), 38-47.
- Fadhel, A. B. , Bianculli, D., & Briand, L. (2015). A comprehensive modeling framework for role-based access control policies. Journal of Systems and Software, 107, 110-126.
- Yao, Q., Wang, Q., Zhang, X., & Fei, J. (2020). Dynamic access control and authorization system based on zero-trust architecture. Proceedings of the 2020 1st International Conference on Control, Robotics and Intelligent System, 123-127.
- Simpson, W. R., & Foltz, K. E. (2021). Network Segmentation and Zero Trust Architectures. Proceedings of the World Congress on Engineering 2021.
- Wagner, N., Sahin, C. S., Peña, J., & Streilein, W. (2019). Automatic Generation of Cyber Architectures Optimized for Security, Cost, and Mission Performance: A Nature-Inspired Approach, pp. 1–25. [CrossRef]
- Simpson, W. R. (2022). Toward a zero trust metric. Procedia Computer Science, 204, 123–130. [CrossRef]
- Kallatsa, M. (2024). Strategies for network segmentation: a systematic literature review. [Master Thesis]. University of Jyväskylä.
- Hemberg, E., Zipkin, J. R., Skowyra, R. W., Wagner, N., & O’Reilly, U.-M. (2018). Adversarial Co-Evolution of Attack and Defense in a Segmented Computer Network Environment. Proceedings of the Genetic and Evolutionary Computation Conference Companion, 1648–1655. [CrossRef]
- Katsis, C., Cicala, F., Thomsen, D., Ringo, N., & Bertino, E. (2021). Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 165–174. [CrossRef]
- Ghosemajumder, S. (2017). You can’t secure 100% of your data 100% of the time. https://hbr.org/2017/12/you-cant-secure-100-of-your-data-100-of-the-time.
- Kujo, J. (2023). Implementing zero trust architecture for identities and endpoints. [master thesis]. Jamk University of Applied Sciences. https://www.theseus.fi/bitstream/handle/10024/796603/Thesis_Jani_Kujo.pdf?sequence=2.
- National Institute of Standards and Technology. (2012). Guide for conducting risk assessment. https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-30r1.pdf.
- Ciampa, M. (2017). CompTIA security+ guide to network security fundamentals. Cengage Learning.
- Deane, A.J. & Kraus, A. (2021) The Official (ISC)2 CISSP CBK Reference, 6th Edition, Wiley.
- Cappelli, D., Moore, A., & Trzeciak, R. (2012). The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (theft, Sabotage, Fraud). Addison-Wesley Professional.
- Ophoff, J., Jensen, A., Sanderson-Smith, J., & Porter, M. (2014). A descriptive literature review and classification of insider threat research. [CrossRef]
- Rousseau, T. L. (2021). Insider Threat: Replacing the Trusted Security Model (Doctoral dissertation, Capella University).
- Greitzer, F. L. (2019, April). Insider threats: It’s the human, stupid!. In Proceedings of the Northwest Cybersecurity Symposium (pp. 1-8).
- Homoliak, I., Toffalini, F., Guarnizo, J., Elovici, Y., & Ochoa, M. (2019). Insight into insiders and it: A survey of insider threat taxonomies, analysis, modeling, and countermeasures. ACM Computing Surveys (CSUR), 52(2), 1-40.
- Shah, V. (2021). Machine Learning Algorithms for Cybersecurity: Detecting and Preventing Threats. Revista Espanola de Documentacion Cientifica, 15(4), 42-66.
- Rabbani, M., Wang, Y., Khoshkangini, R., Jelodar, H., Zhao, R., Bagheri Baba Ahmadi, S., & Ayobi, S. (2021). A review on machine learning approaches for network malicious behavior detection in emerging technologies. Entropy, 23(5), 529.
- Johri, A., & Kumar, S. (2023). Exploring customer awareness towards their cyber security in the Kingdom of Saudi Arabia: A study in the era of banking digital transformation. Human Behavior and Emerging Technologies, 2023(1), 2103442.
- Moallem, A. (2019). Cybersecurity awareness among students and faculty. CRC Press.
- Ameen, N., Tarhini, A., Shah, M. H., Madichie, N., Paul, J., & Choudrie, J. (2021). Keeping customers’ data secure: A cross-cultural study of cybersecurity compliance among the Gen-Mobile workforce. Computers in Human Behavior, 114, 106531.
- McCrohan, K. F., Engel, K., & Harvey, J. W. (2010). Influence of awareness and training on cyber security. Journal of Internet Commerce, 9(1), 23-41.
- Norris, D. F., Mateczun, L., Joshi, A., & Finin, T. (2018). Cybersecurity at the grassroots: American local governments and the challenges of internet security. Journal of Homeland Security and Emergency Management, 15(3), 20170048.
- Miranda, M. J. (2018). Enhancing cybersecurity awareness training: A comprehensive phishing exercise approach. International Management Review, 14(2), 5-10.
- Li, Y., Xin, T., & Siponen, M. (2022). Citizens‘ cybersecurity behavior: Some major challenges. IEEE Security & Privacy, 20(1), 54-61.
- Zhang, Z., He, W., Li, W., & Abdous, M. H. (2021). Cybersecurity awareness training programs: a cost–benefit analysis framework. Industrial Management & Data Systems, 121(3), 613-636.
- Nurse, J. R., Creese, S., Goldsmith, M., & Lamberts, K. (2011, September). Guidelines for usable cybersecurity: Past and present. In 2011 third international workshop on cyberspace safety and security (CSS) (pp. 21-26). IEEE.
- AlQadheeb, A., Bhattacharyya, S., & Perl, S. (2022). Enhancing cybersecurity by generating user-specific security policy through the formal modeling of user behavior. Array, 14, 100146.
- Phiayura, P., & Teerakanok, S. (2023). A comprehensive framework for migrating to zero trust architecture. IEEE Access, 11, 19487-19511.
- Tissir, N., El Kafhali, S., & Aboutabit, N. (2021). Cybersecurity management in cloud computing: semantic literature review and conceptual framework proposalLinks to an external site.. Journal of Reliable Intelligent Environments, 7(2), 69-84.
- Tabrizchi, H., & Kuchaki Rafsanjani, M. (2020). A survey on security challenges in cloud computing: issues, threats, and solutions. The journal of supercomputing, 76(12), 9493-9532.
- Cloud Security Alliance (2021). Toward a Zero Trust Architecture: A Guided Approach for a Complex and Hybrid World. Cloud Security Alliance.
- National Institute of Standards and Technology (NIST). (2024). The NIST Cybersecurity Framework (CFS) 2.0. National Institute of Standards.
- Fotiou, N., Machas, A., Polyzos, G. C., & Xylomenos, G. (2015). Access control as a service for the Cloud. Journal of Internet Services and Applications, 6, 1-15.
- Sun, P. (2020). Security and privacy protection in cloud computing: Discussions and challenges. Journal of Network and Computer Applications, 160, 102642.
- Tourani, R. , Stubbs, R., & Misra, S. (2018, July). TACTIC: Tag-based access control framework for the information-centric wireless edge networks. In 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS) (pp. 456-466). IEEE.
- ang, Z. (2021, November). A Survey of Security Issues in Mobile Cloud ComputingLinks to an external site.. In 2021 International Conference on Signal Processing and Machine Learning (CONF-SPML) (pp. 117-121). IEEE.
- Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691-697.
- Reed, C. Rezek, C & P. Simmonds. Security Guidance for Critical Area of Focus in Cloud Computing V3.0, Cloud Security Alliance (CSA), 2011, p.1-177.
- Loaiza Enriquez, R. (2021). Cloud Security Posture Management/CSPM) in Azure.
- Mo, J., Hu, Z., Chen, H., & Shen, W. (2019). An efficient and provably secure anonymous user authentication and key agreement for mobile cloud computing. Wireless Communications and Mobile Computing, 2019(1), 4520685.
- Ahmed, A. A., Wendy, K., Kabir, M. N., & Sadiq, A. S. (2020). Dynamic reciprocal authentication protocol for mobile cloud computing. IEEE Systems Journal, 15(1), 727-737.
- Derhab, A., Belaoued, M., Guerroumi, M., & Khan, F. A. (2020). Two-factor mutual authentication offloading for mobile cloud computing. IEEE Access, 8, 28956-28969.
- Mugabo, E., & Zhang, Q. Y. (2020). Intrusion Detection Method Based on Support Vector Machine and Information Gain for Mobile Cloud Computing. International Journal of Network Security, 22(2), 231-241.
- Ogwara, N. O., Petrova, K., Yang, M. L., & MacDonell, S. (2021). Enhancing Data Security in the User Layer of Mobile Cloud Computing Environment: A Novel Approach. Advances in Security, Networks, and Internet of Things: Proceedings from SAM’20, ICWN’20, ICOMP’20, and ESCS’20, 129-145.
- ackson, M. (2021). The Impact of Cyberattacks and Cyberthreats on Higher Education Institutions (Master’s thesis, The College of St. Scholastica).
- Ghosh, M. M. A., Atallah, R. R., & Naser, S. S. A. (2016). Secure mobile cloud computing for sensitive data: Teacher services for Palestinian higher education institutions. International Journal of Grid and Distributed Computing, 9(2), 17-22.
- DeWeaver, L. F. (2021). Exploring How Universities Can Reduce Successful Cyberattacks by Incorporating Zero Trust (Doctoral dissertation, Colorado Technical University).
- Culnan, M. J., & Carlin, T. J. (2009). Online privacy practices in higher education: making the grade? Communications of the ACM, 52(3), 126-130.
- Daraghmi, E. Y., Daraghmi, Y. A., & Yuan, S. M. (2019). UniChain: a design of blockchain-based system for electronic academic records access and permissions management. Applied Sciences, 9(22), article 4966.
- Lund, B. D. (2021). Public libraries’ data privacy policies: a content and cluster analysis. The Serials Librarian, 81(1), 99-107.
- Hess, A. N., LaPorte-Fiori, R., & Engwall, K. (2015). Preserving patron privacy in the 21st century academic library. The Journal of Academic Librarianship, 41(1), 105-114.
- Amini, M., Vakilimofrad, H., & Saberi, M. K. (2021). Human factors affecting information security in libraries. The Bottom Line, 34(1), 45-67.
- Mars, P. (2017). ALA Precedent in Defense of Personal Privacy and Privacy Activism of 21st-Century Information Professionals. The Serials Librarian, 73(1), 54-57.
- Dietz, F. (2022). Timeout reached, session ends? (Doctoral dissertation, Humboldt Universitaet zu Berlin).
- Mentzer, J., Witt, W. D., Keebler, J., Min, S., Nix, N., Smith, D., & Zacharia, Z. (2001). Defining supply chain management. Journal of Business Logistics, 22(2), 1-25.
- ouncil of Supply Chain Management Professionals. (n.d.). Outbound logistics. In CSCMP Supply Chain Management Definitions and Glossary. https://cscmp.org/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms/CSCMP/Educate/SCM_Definitions_and_Glossary_of_Terms.aspx?hkey=60879588-f65f-4ab5-8c4b-6878815ef921.
- Felea, M., & Albăstroiu, I. (2013). Defining the concept of supply chain management and its relevance to Romanian academics and practitioners. Amfiteatru Economic Journal, 15(33), 74-88.
- Canadian Centre for Cyber Security. (2022). National cyber threat assessment. https://www.cyber.gc.ca/sites/default/files/ncta-2023-24-web.pdf.
- Gopal, P. R. C., Rana, N. P., Krishna, T. V., & Ramkumar, M. (2024). Impact of big data analytics on supply chain performance: an analysis of influencing factors. Annals of Operations Research, 333(2), 769-797.
- Ogbuke, N. J., Yusuf, Y. Y., Dharma, K., & Mercangoz, B. A. (2022). Big data supply chain analytics: ethical, privacy and security challenges posed to business, industries and society. Production Planning & Control, 33(2-3), 123-137.
- Collier, Z. A., & Sarkis, J. (2021). The zero trust supply chain: Managing supply chain risk in the absence of trust. International Journal of Production Research, 59(11), 3430-3445.
- National Institute of Standards and Technology. (2020). Zero trust architecture. https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-207.pdf.
|
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).