Zero trust cybersecurity: Critical success factors and A maturity assessment framework

被引:9
作者
Yeoh, William [1 ,2 ]
Liu, Marina [1 ,3 ]
Shore, Malcolm [1 ]
Jiang, Frank [1 ,3 ]
机构
[1] Deakin Univ, Ctr Cyber Resilience & Trust CREST, Geelong, Vic, Australia
[2] Deakin Univ, Dept Informat Syst & Business Analyt, Geelong, Vic, Australia
[3] Deakin Univ, Sch Informat Technol, Geelong, Vic, Australia
关键词
Zero trust; Critical success factors; Maturity assessment; Delphi method; Cybersecurity; EXPERT INTERVIEW; KNOWLEDGE;
D O I
10.1016/j.cose.2023.103412
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Zero trust cybersecurity is beginning to replace traditional perimeter-based security strategies and is being adopted by organizations across a wide range of industries. However, the implementation of zero trust is a complex undertaking, different from traditional perimeter-based security, and requires a fresh approach in terms of its management. As such, a clear set of critical success factors (CSFs) will help organizations to better plan, assess, and manage their zero trust cybersecurity. In response, we investigated the CSFs for implementing zero trust cybersecurity by conducting a three-round Delphi study to obtain the consensus from a panel of 12 cybersecurity experts. We built a multi-dimensional CSFs framework that comprises eight dimensions, namely identity, endpoint, application and workload, data, network, infrastructure, visibility and analytics, and auto-mation and orchestration. Based on the CSFs, we developed a maturity assessment framework enabling orga-nizations to evaluate their zero trust maturity. This paper contributes to a theoretical understanding of how to deploy zero trust from multiple dimensions and offers a viable guidance framework for organizations from a practical perspective. This paper is useful for organizational stakeholders who are in the process of planning, reviewing, or implementing zero trust cybersecurity.
引用
收藏
页数:13
相关论文
共 33 条
  • [1] ACT-IAC, 2019, ZER TRUST CYB CURR T
  • [2] An analysis of zero-trust architecture and its cost-effectiveness for organizational security
    Adahman, Zillah
    Malik, Asad Waqar
    Anwar, Zahid
    [J]. COMPUTERS & SECURITY, 2022, 122
  • [3] Research and scholarly methods: Semi-structured interviews
    Adeoye-Olatunde, Omolola A.
    Olenik, Nicole L.
    [J]. JOURNAL OF THE AMERICAN COLLEGE OF CLINICAL PHARMACY, 2021, 4 (10): : 1358 - 1367
  • [4] Bennett M., 2017, F RES
  • [5] Bobbert Y., 2020, Sci. J. Res. Reviews, V2, DOI [10.33552/SJRR.2020.02.000546, DOI 10.33552/SJRR.2020.02.000546]
  • [6] Bogner A, 2009, RES METHODS SER, P43
  • [7] Reflecting on reflexive thematic analysis
    Braun, Virginia
    Clarke, Victoria
    [J]. QUALITATIVE RESEARCH IN SPORT EXERCISE AND HEALTH, 2019, 11 (04) : 589 - 597
  • [8] Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
    Buck, Christoph
    Olenberger, Christian
    Schweizer, Andre
    Volter, Fabiane
    Eymann, Torsten
    [J]. COMPUTERS & SECURITY, 2021, 110
  • [9] Beyond Zero Trust: Trust Is a Vulnerability
    Campbell, Mark
    [J]. COMPUTER, 2020, 53 (10) : 110 - 113
  • [10] CISA, 2021, Tech. Rep.