Zero Trust Architecture: Implementing Microsegmentation in Enterprise Networks

Authors

  • Vinay Kumar Reddy Vangoor Engineer II, MetaSoftTech Solutions LLC, Arizona Author
  • Sai Manoj Yellepeddi Independent Researcher, Redmond, USA Author
  • Chetan Sasidhar Ravi Mulesoft Developer, Zurich American Insurance, Illinois, USA Author
  • Ashok Kumar Pamidi Venkata Senior Solutions Specialist, Deloitte, Georgia, USA Author
  • Pranadeep Katari Senior AWS Network Security Engineer, Vitech Systems Group, Massachusetts, USA Author

Keywords:

Zero Trust Architecture, microsegmentation, enterprise networks

Abstract

Zero Trust Architecture (ZTA) is a key cybersecurity paradigm due to cyber threat complexity and commercial network security. With insider threats, APTs, mobility, and cloud computing, perimeter defenses cannot safeguard critical data and infrastructure. With "never trust, always verify," ZTA redefines security by assuming network and external threats. We cover ZTA and corporate network microsegmentation. 

Networks are microsegmented to limit attacker mobility and security. ZTA designs must be microsegmented to meet security requirements, deploy network components, and manage the network. The research examines network identification, segmentation, policy enforcement, and microsegmentation monitoring. 

References

N. M. Amritraj and R. C. K. Lee, “A Survey on Zero Trust Security Models for Enterprise Networks,” IEEE Access, vol. 8, pp. 45871-45887, 2020.

M. Shafique, W. Ahmed, and R. Rasheed, “Microsegmentation Techniques for Enhanced Network Security: A Review,” IEEE Transactions on Network and Service Management, vol. 17, no. 3, pp. 1705-1721, Sept. 2020.

A. B. Tanna, S. Verma, and S. Gupta, “Implementing Zero Trust Architecture in Cloud Environments: Challenges and Solutions,” IEEE Cloud Computing, vol. 7, no. 4, pp. 48-56, July-Aug. 2020.

R. Patel and H. Lee, “Microsegmentation for Enhanced Network Security: Design, Implementation, and Evaluation,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 10, pp. 2336-2349, Oct. 2020.

M. K. Patel, “Zero Trust Networks: An Evolutionary Approach to Network Security,” IEEE Security & Privacy, vol. 18, no. 1, pp. 18-27, Jan.-Feb. 2020.

S. Wong and J. Kumar, “Microsegmentation: A Case Study in Financial Institutions,” IEEE Transactions on Information Forensics and Security, vol. 15, pp. 212-224, 2020.

Y. Li and M. Wang, “Towards Zero Trust Networks: A Comprehensive Survey,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1023-1056, Secondquarter 2020.

S. Arora and R. Gupta, “Adaptive Policy Management for Microsegmentation in Data Centers,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 1234-1248, June 2020.

J. C. Berger and M. K. Weiss, “Zero Trust Security: Theoretical Foundations and Practical Implications,” IEEE Transactions on Dependable and Secure Computing, vol. 17, no. 5, pp. 1411-1424, Sept.-Oct. 2020.

T. Singh and R. Sharma, “Challenges in Implementing Microsegmentation in Healthcare Networks,” IEEE Journal of Biomedical and Health Informatics, vol. 24, no. 2, pp. 654-662, Feb. 2020.

K. J. Lee and A. M. Lim, “Zero Trust Architecture: An Industry Perspective,” IEEE Transactions on Computers, vol. 69, no. 6, pp. 875-887, June 2020.

B. Johnson and L. Kim, “Evaluating the Impact of Microsegmentation on Network Performance,” IEEE Transactions on Network and Service Management, vol. 17, no. 1, pp. 321-334, Mar. 2020.

H. M. Chen and J. Lee, “Securing Cloud Environments with Zero Trust: A Comparative Study,” IEEE Transactions on Cloud Computing, vol. 8, no. 4, pp. 1045-1059, Oct.-Dec. 2020.

R. S. Brown and T. M. Scott, “Practical Considerations for Microsegmentation in Enterprise Networks,” IEEE Network, vol. 34, no. 6, pp. 76-82, Nov.-Dec. 2020.

M. Patel and L. Zhang, “Zero Trust Architecture: Adoption Challenges and Best Practices,” IEEE Access, vol. 8, pp. 76543-76556, 2020.

S. Gupta and A. B. Singh, “Automating Policy Enforcement in Microsegmented Networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 4, pp. 1950-1963, Dec. 2020.

T. J. White and M. Y. Liu, “Microsegmentation: Enhancing Visibility and Control in Large-Scale Networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 5, pp. 2034-2048, Mar. 2020.

N. Patel and M. M. Joshi, “Zero Trust Security Models: A Survey of Current Implementations,” IEEE Security & Privacy, vol. 18, no. 3, pp. 45-56, May-June 2020.

R. A. Verma and K. S. Park, “The Role of Microsegmentation in Modern Security Architectures,” IEEE Transactions on Information Forensics and Security, vol. 15, no. 4, pp. 897-910, Aug. 2020.

J. A. Fisher and S. R. Lee, “Future Directions in Zero Trust Architecture and Microsegmentation,” IEEE Communications Magazine, vol. 58, no. 12, pp. 20-26, Dec. 2020.

Published

29-02-2024

How to Cite

Zero Trust Architecture: Implementing Microsegmentation in Enterprise Networks. (2024). Journal of Artificial Intelligence Research and Applications, 4(1), 512-539. https://jairajournal.org/index.php/publication/article/view/43