Please use this identifier to cite or link to this item: https://rda.sliit.lk/handle/123456789/4078
Title: Evaluating Zero Trust Vulnerabilities in Identity and Access Management: Strengthening Security Posture in Dynamic Environments.
Authors: Sivalingam, K
Keywords: Zero Trust
Identity and Access Management (IAM)
Cybersecurity frameworks
Data security protocols
Incident response
Data Loss Prevention (DLP) Vulnerability assessment
Cyber threat resilience
Organizational security
Digital asset protection
Issue Date: Dec-2024
Publisher: SLIIT
Abstract: In the era of widespread digital transformation, cybersecurity frameworks play a crucial role in protecting essential assets. The Zero Trust model has become prominent, advocating a “always verify, never trust” approach to secure network access and control. This study examines vulnerabilities within Zero Trust-based Identity and Access Management (IAM) systems, focusing on the challenges that arise in dynamic digital environments where technological advancements and shifting user behaviors impact security. Using a mixed-methods approach, the research combines quantitative survey data from cybersecurity professionals with qualitative insights from case studies and expert interviews. Findings indicate that while Zero Trust models strengthen organizational security posture, they introduce operational complexities. High resource demands, integration difficulties, and the need for continuous monitoring pose challenges for organizations, potentially hindering efficient operations. These hurdles underscore the difficulty of balancing Zero Trust’s security benefits with streamlined processes. Additionally, the study reveals that Zero Trust IAM vulnerabilities become especially evident in fast-paced digital settings, where rapidly changing technology and varied user interactions demand an adaptive security approach. To address these vulnerabilities, the study proposes a structured Zero Trust implementation framework, comprising seven key stages: preparation and assessment, identity verification and access control, network and device security, continuous monitoring via User Behavior Analytics (UBA), data security protocols, incident response, and compliance integration. Each stage targets specific challenges, aiming to enhance security without compromising operational efficiency. For example, identity verification and access control help ensure strict authentication, while network segmentation and endpoint security protect critical assets. Regular monitoring with UBA aids in detecting insider threats, and data security protocols like encryption and Data Loss Prevention (DLP) safeguard sensitive information. This research contributes to cybersecurity in several ways. Academically, it advances understanding of the vulnerabilities within Zero Trust IAM systems, particularly in dynamic environments where these weaknesses are accentuated. Methodologically, it presents a replicable framework that integrates quantitative and qualitative approaches, providing a comprehensive lens for future cybersecurity research. Practically, the study offers actionable recommendations for organizations across industries, enabling them to bolster their security postures against emerging threats. These insights are invaluable for policymakers and industry leaders seeking to establish resilient cybersecurity standards and guidelines in a rapidly evolving digital landscape. Ultimately, this research provides a detailed look at Zero Trust IAM vulnerabilities and emphasizes the need for adaptive security strategies to navigate the challenges of a complex digital environment. By addressing key operational hurdles and proposing targeted solutions, this study makes a significant contribution to advancing cybersecurity practices. Its findings underscore the importance of flexible security measures that enable organizations to protect digital assets effectively, supporting organizational resilience within an interconnected and increasingly volatile digital space.
URI: https://rda.sliit.lk/handle/123456789/4078
Appears in Collections:MSc 2024



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.