Download PDFOpen PDF in browserThe Challenges and Processes of Achieving Optimal Implementation of Zero Trust Architecture in WorkplaceEasyChair Preprint 1087811 pages•Date: September 10, 2023AbstractZero Trust Architecture (ZTA) is one of the newest approaches in tackling cyber threats in organizations. While the goal is to reduce the impact of cyber threats by assuming no implicit trust, as well as constant monitoring, and restricted access to critical enterprise resources, the adoption and implementation in many organizations has not reached the maturity level and faces myriads of challenges given the heterogeneity of the various components including Internet of Things (IoT) and mobile devices that constitute the architecture. This paper examines the state-of-the-art approaches in the implementation of ZTA in workplaces, and its extension to mobile and IoT devices used to access organizational resources remotely. Although there has been existing work that have proposed effective ways of implementing ZTA across spectrum of organization’s resources and applications, the challenges of the implementation in mobile and IoT solutions in workplaces have not been fully addressed. Based on a holistic exploration of the ZTA concepts as presented in recent research publications, this work identifies the key challenges impeding realization of ZTA in resource-constrained devices and discusses strategic schemes that could help in achieving ZTA in both enterprises’ vertical and horizontal business processes, as advanced by the National Institute of Standards and Technology (NIST) standards and framework. Keyphrases: IT architectures, Internet of Things, Security and Privacy, Ubiquitous and mobile computing, Workplace, Zero Trust Architecture, business process
|