Implementation of Zero Trust Security in MSME Enterprise Architecture: Challenges and Solutions

Authors

  • Abdul Rahman Pradita University, Serpong, Tangerang
  • Eko Indrajit Pradita University, Serpong, Tangerang
  • Akhmad Unggul Pradita University, Serpong, Tangerang
  • Erick Dazki Pradita University, Serpong, Tangerang

DOI:

10.33395/sinkron.v8i3.13949

Keywords:

Zero Trust Security (ZTS), Enterprise Architecture, Micro, Small, and Medium Enterprises (MSMEs), Cybersecurity Awareness, Security Incident Reduction

Abstract

This research examines the implementation of Zero Trust Security in Enterprise Architecture in Micro, Small, and Medium Enterprises to improve cybersecurity. The background of this research focuses on the increasing cyber threats faced by MSMEs and their limitations in adopting advanced security systems. The purpose of this study is to evaluate the effectiveness of Zero Trust Security in protecting MSME data and information systems from internal and external threats, as well as identifying challenges and solutions in its implementation. The research method used is a case study on several MSMEs with a qualitative and quantitative approach involving in-depth interviews, surveys, and secondary data analysis. The results showed that the implementation of ZTS significantly improved information system security in MSMEs, with a 45% reduction in security incidents after ZTS adoption. In addition, ZTS was also shown to increase cybersecurity awareness among MSME employees. The main challenges identified include the need for adequate training, changes in organizational culture, and budget limitations. To overcome these challenges, this study recommends the adoption of continuous training strategies, increased cybersecurity awareness, and the utilization of affordable yet effective security solutions. The conclusion of this study confirms that Zero Trust Security is an effective and efficient approach to improving the cybersecurity of MSMEs. However, further research is recommended to explore the application of Zero Trust Security in various other industry contexts and to develop more affordable solutions for MSMEs with limited resources.

GS Cited Analysis

Downloads

Download data is not yet available.

References

Adahman, Z., Waqar, A., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122. https://doi.org/10.1016/j.cose.2022.102911

Ajmal, M., Abdullah, S., Arshad, J., Lallie, H., & Hassan, Y. (2025). Verify and trust : A multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 27(April 2024), 1–27. https://doi.org/10.1016/j.iot.2024.101227

Alagappan, A., Kumar, S., John, L., & Andrews, B. (2022). Augmenting Zero Trust Network Architecture to enhance security in virtual power plants. Energy Reports, 8, 1309–1320. https://doi.org/10.1016/j.egyr.2021.11.272

Fernandez, E. B., & Brazhuk, A. (2024). A critical analysis of Zero Trust Architecture ( ZTA ). Computer Standards & Interfaces, 89(January). https://doi.org/10.1016/j.csi.2024.103832

Griffin, P. H. (2015). Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange. Procedia - Procedia Computer Science, 61, 66–71. https://doi.org/10.1016/j.procs.2015.09.150

Hindarto, D. (2023). The Management of Projects is Improved Through Enterprise Architecture on Project Management Application Systems. International Journal Software Engineering and Computer Science (IJSECS), 3(2 SE-Articles), 151–161. https://doi.org/10.35870/ijsecs.v3i2.1512

Hindarto, D., Indrajit, R. E., & Dazki, E. (2021). Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron, 6(1), 13–24. https://doi.org/10.33395/sinkron.v6i1.11115

Imtiaz, S. I., Rehman, S. ur, Javed, A. R., Jalil, Z., Liu, X., & Alnumay, W. S. (2021). DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Generation Computer Systems, 115, 844–856. https://doi.org/10.1016/j.future.2020.10.008

Judijanto, L., & Hindarto, D. (2023). Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks. 3(December), 386–396.

Kilay, A. L., Simamora, B. H., & Putra, D. P. (2022). The Influence of E-Payment and E-Commerce Services on Supply Chain Performance: Implications of Open Innovation and Solutions for the Digitalization of Micro, Small, and Medium Enterprises (MSMEs) in Indonesia. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 119. https://doi.org/10.3390/joitmc8030119

Mittal, A., Gupta, M. P., Chaturvedi, M., Chansarkar, S. R., & Gupta, S. (2021). Cybersecurity Enhancement through Blockchain Training (CEBT) – A serious game approach. International Journal of Information Management Data Insights, 1(1). https://doi.org/10.1016/j.jjimei.2020.100001

Saleem, M., Warsi, M. R., & Islam, S. (2023). Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. Journal of Information Security and Applications, 72(December 2022). https://doi.org/10.1016/j.jisa.2022.103389 Available

Sengupta, B., & Lakshminarayanan, A. (2021). DistriTrust : Distributed and low-latency access validation in zero-trust architecture. Journal of Information Security and Applications, 63(October). https://doi.org/10.1016/j.jisa.2021.103023 Available

Singh, A., Kumar, R., Ali, A., & Balaji, P. (2023). Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT. Alexandria Engineering Journal, 81(July), 449–459. https://doi.org/10.1016/j.aej.2023.08.084

Sun, P., Liu, P., Li, Q., Liu, C., Lu, X., Hao, R., & Chen, J. (2020). DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. Security and Communication Networks, 2020, 8890306. https://doi.org/10.1155/2020/8890306

Wang, F., Gai, Y., & Zhang, H. (2024). Blockchain user digital identity big data and information security process protection based on network trust. Journal of King Saud University - Computer and Information Sciences, 36(April).

Downloads


Crossmark Updates

How to Cite

Rahman, A., Indrajit, E. ., Unggul, A. ., & Dazki, E. . (2024). Implementation of Zero Trust Security in MSME Enterprise Architecture: Challenges and Solutions. Sinkron : Jurnal Dan Penelitian Teknik Informatika, 8(3), 2077-2087. https://doi.org/10.33395/sinkron.v8i3.13949

Most read articles by the same author(s)

1 2 > >>