Zero Trust Security Model for Enterprise Networks

Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-...

Full description

Saved in:
Bibliographic Details
Published inIraqi Journal of Information & Communication Technology Vol. 6; no. 2; pp. 68 - 77
Main Authors M. Habash, Rania, Khalel, Mahmood
Format Journal Article
LanguageEnglish
Published College of Information Engineering 15.12.2024
Subjects
Online AccessGet full text
ISSN2222-758X
2789-7362
DOI10.31987/ijict.6.2.223

Cover

Loading…
Abstract Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-based architecture, which makes the assumption that all internal network parties are trusted and all external network parties are untrusted. In enterprise network the internal network parties is automatically seen as trusted entities granting them access to network resources. The insider threat actor has been successful in exploiting their access. So that, enterprise networks become more exposed to inside and outside threads. As a result, we need to add the zero-trust principle to the enterprise network to protect it from the inside. In this paper, the ZT model, is assumed inside the militarized zone. There may be a threat to the sensitive data. Any internal company network users cannot manipulation on his computer without permission from the administrator this is done by the group policies that have been implemented in ZT. This model has been shown to be quite effective in protecting the sensitive data against unauthorized access and also the manipulation by the insider user. Following that, an attack originating from inside of the network was launched against the enterprise and zero trust network. In the enterprise network, the network was effectively attacked, and the attack’s validity was also increased to fully penetrate the enterprise. The attack did not succeed in the zero-trust network because the attacker cannot pass the User Account Control (UAC) to gain the NT authority.
AbstractList Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients trying to access recourses on private networks regardless of whether they are sitting within or outside the networks. As opposed to perimeter-based architecture, which makes the assumption that all internal network parties are trusted and all external network parties are untrusted. In enterprise network the internal network parties is automatically seen as trusted entities granting them access to network resources. The insider threat actor has been successful in exploiting their access. So that, enterprise networks become more exposed to inside and outside threads. As a result, we need to add the zero-trust principle to the enterprise network to protect it from the inside. In this paper, the ZT model, is assumed inside the militarized zone. There may be a threat to the sensitive data. Any internal company network users cannot manipulation on his computer without permission from the administrator this is done by the group policies that have been implemented in ZT. This model has been shown to be quite effective in protecting the sensitive data against unauthorized access and also the manipulation by the insider user. Following that, an attack originating from inside of the network was launched against the enterprise and zero trust network. In the enterprise network, the network was effectively attacked, and the attack’s validity was also increased to fully penetrate the enterprise. The attack did not succeed in the zero-trust network because the attacker cannot pass the User Account Control (UAC) to gain the NT authority.
Author M. Habash, Rania
Khalel, Mahmood
Author_xml – sequence: 1
  givenname: Rania
  surname: M. Habash
  fullname: M. Habash, Rania
– sequence: 2
  givenname: Mahmood
  surname: Khalel
  fullname: Khalel, Mahmood
BookMark eNo9kE1LAzEQhoNUsNZePe8f2HXytdkcpVQtVD1YQbyEJJ3I1tpIskX67w2tOJcZXpiHl-eSjHZxh4RcU2g41Z266Te9H5q2YQ1j_IyMmep0rXjLRuUuUyvZvV2Qac4bAGCaCZByTOg7plit0j4P1Qv6feqHQ_UY17itQkzVfDdg-k59xuoJh5-YPvMVOQ92m3H6tyfk9W6-mj3Uy-f7xex2WXsqJK-tlx1ttWNUAQhw0illuzVjGoMTjEsKrQTnrVTWKiUDgvbMCkdLMS41n5DFibuOdmNKhy-bDiba3hyDmD6MTUPvt2iUKA_ey8BDJ5RGp7TmXAN2IDSlrLCaE8unmHPC8M-jYI7-zNGfaQ0zxR__Be-AY0w
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.31987/ijict.6.2.223
DatabaseName CrossRef
Directory of Open Access Journals (DOAJ)
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2789-7362
EndPage 77
ExternalDocumentID oai_doaj_org_article_74359cc5f3f8479eb7993390e8049112
10_31987_ijict_6_2_223
GroupedDBID AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c1453-ac58169b2170040b5b77a8d229efb423510650bca57aa775fe09c2a4b14053593
IEDL.DBID DOA
ISSN 2222-758X
IngestDate Wed Aug 27 01:28:16 EDT 2025
Tue Jul 01 00:53:04 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c1453-ac58169b2170040b5b77a8d229efb423510650bca57aa775fe09c2a4b14053593
OpenAccessLink https://doaj.org/article/74359cc5f3f8479eb7993390e8049112
PageCount 10
ParticipantIDs doaj_primary_oai_doaj_org_article_74359cc5f3f8479eb7993390e8049112
crossref_primary_10_31987_ijict_6_2_223
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-12-15
PublicationDateYYYYMMDD 2024-12-15
PublicationDate_xml – month: 12
  year: 2024
  text: 2024-12-15
  day: 15
PublicationDecade 2020
PublicationTitle Iraqi Journal of Information & Communication Technology
PublicationYear 2024
Publisher College of Information Engineering
Publisher_xml – name: College of Information Engineering
SSID ssj0002924055
Score 2.276896
Snippet Zero Trust (ZT) is security model and follow the concept of ânever trust, always verifyâ. ZT require to strict identity verification for devise and clients...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 68
SubjectTerms Cybersecurity
Enterprise network
Never trust
Zero Trust model
Zero Trust security
Title Zero Trust Security Model for Enterprise Networks
URI https://doaj.org/article/74359cc5f3f8479eb7993390e8049112
Volume 6
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV3PS8MwGA2ykxdRVJy_yEHw1C1N8zXNUWVjCO7iBsNLSLIUKtLJNv__fUmqzJMXr6WE9n0k33vw5T1C7hxIJpZMZOAsxAizzLJKZUZaQC1WqrwOl5NfpuVkLp4XsNiL-gozYckeOAE3xA4HyjmoixoPUuWtxI6KQt1XyG3zmC_MseftialwBnOUFSxGnmL_QwoJ1SI5NhZBZA-b98ZtB-WADzgvfnWkPeP-2GHGx-Soo4b0IX3SCTnw7SnJ3_x6RWfhZgR97bLmaAgw-6BIN-kozQw2G0-naaB7c0bm49HsaZJ1MQeZywUUmXFQ5aWyPFjlCWbBSmmqJefK1xbZDu4apFHWGZDGSAm1Z8pxIyxqI0BwinPSa1etvyAUYa68EMIwI4ITmPJOMsPcElmgw2X75P77V_VncrPQqAIiKDqCokvNNYLSJ48BiZ-3ggt1fIC10V1t9F-1ufyPRa7IIUciEUZIcrgmve36y98gEdja21jzHZziqsM
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Zero+Trust+Security+Model+for+Enterprise+Networks&rft.jtitle=Iraqi+Journal+of+Information+%26+Communication+Technology&rft.au=Rania+M.+Habash&rft.au=mahmood+khalel&rft.date=2024-12-15&rft.pub=College+of+Information+Engineering&rft.issn=2222-758X&rft.eissn=2789-7362&rft.volume=6&rft.issue=2&rft_id=info:doi/10.31987%2Fijict.6.2.223&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_74359cc5f3f8479eb7993390e8049112
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2222-758X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2222-758X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2222-758X&client=summon