Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations DOI Open Access
Vedran Dakić, Zlatan Morić,

Ana Kapulica

et al.

Published: July 18, 2024

The Zero Trust Architecture (ZTA) security system follows the "never trust, always verify" principle. process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA enforce strict identity verification rules across cloud environment improve security. Implementation is time-consuming difficult. Azure's extensive services customizations require careful design implementation. administrators struggle navigate change configurations due its complex user interface (UI). Each ecosystem component must meet criteria. ZTA's comprehensive policy definitions, multi-factor pass-wordless authentication, other advanced features are tested in a mid-size business scenario. These configuration changes solid grasp of architecture Trust. Implementing an reduces vulnerabilities restricts authorized users' critical expensive, requires significant commitment changing IT procedures, can be confusing because same available multiple places. has shown great potential for both hybrid cloud-native companies.

Language: Английский

Impact of Virtual Power Plants on grid stability and renewable energy integration in smart cities using IoT DOI

Mahmood Sawilam,

Burak Kizilkaya, Ahmad Taha

et al.

Energy Reports, Journal Year: 2025, Volume and Issue: 13, P. 3312 - 3323

Published: March 11, 2025

Language: Английский

Citations

0

Analysis of Azure Zero Trust Architecture Implementation for Mid-size Organizations DOI Open Access
Vedran Dakić, Zlatan Morić,

Ana Kapulica

et al.

Published: July 18, 2024

The Zero Trust Architecture (ZTA) security system follows the "never trust, always verify" principle. process constantly verifies users and devices trying to access resources. This paper describes how Microsoft Azure uses ZTA enforce strict identity verification rules across cloud environment improve security. Implementation is time-consuming difficult. Azure's extensive services customizations require careful design implementation. administrators struggle navigate change configurations due its complex user interface (UI). Each ecosystem component must meet criteria. ZTA's comprehensive policy definitions, multi-factor pass-wordless authentication, other advanced features are tested in a mid-size business scenario. These configuration changes solid grasp of architecture Trust. Implementing an reduces vulnerabilities restricts authorized users' critical expensive, requires significant commitment changing IT procedures, can be confusing because same available multiple places. has shown great potential for both hybrid cloud-native companies.

Language: Английский

Citations

2