Implementation of Zero Trust Security in MSME Enterprise Architecture: Challenges and Solutions
DOI:
10.33395/sinkron.v8i3.13949Keywords:
Zero Trust Security (ZTS), Enterprise Architecture, Micro, Small, and Medium Enterprises (MSMEs), Cybersecurity Awareness, Security Incident ReductionAbstract
This research examines the implementation of Zero Trust Security in Enterprise Architecture in Micro, Small, and Medium Enterprises to improve cybersecurity. The background of this research focuses on the increasing cyber threats faced by MSMEs and their limitations in adopting advanced security systems. The purpose of this study is to evaluate the effectiveness of Zero Trust Security in protecting MSME data and information systems from internal and external threats, as well as identifying challenges and solutions in its implementation. The research method used is a case study on several MSMEs with a qualitative and quantitative approach involving in-depth interviews, surveys, and secondary data analysis. The results showed that the implementation of ZTS significantly improved information system security in MSMEs, with a 45% reduction in security incidents after ZTS adoption. In addition, ZTS was also shown to increase cybersecurity awareness among MSME employees. The main challenges identified include the need for adequate training, changes in organizational culture, and budget limitations. To overcome these challenges, this study recommends the adoption of continuous training strategies, increased cybersecurity awareness, and the utilization of affordable yet effective security solutions. The conclusion of this study confirms that Zero Trust Security is an effective and efficient approach to improving the cybersecurity of MSMEs. However, further research is recommended to explore the application of Zero Trust Security in various other industry contexts and to develop more affordable solutions for MSMEs with limited resources.
Downloads
References
Adahman, Z., Waqar, A., & Anwar, Z. (2022). An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Computers & Security, 122. https://doi.org/10.1016/j.cose.2022.102911
Ajmal, M., Abdullah, S., Arshad, J., Lallie, H., & Hassan, Y. (2025). Verify and trust : A multidimensional survey of zero-trust security in the age of IoT. Internet of Things, 27(April 2024), 1–27. https://doi.org/10.1016/j.iot.2024.101227
Alagappan, A., Kumar, S., John, L., & Andrews, B. (2022). Augmenting Zero Trust Network Architecture to enhance security in virtual power plants. Energy Reports, 8, 1309–1320. https://doi.org/10.1016/j.egyr.2021.11.272
Fernandez, E. B., & Brazhuk, A. (2024). A critical analysis of Zero Trust Architecture ( ZTA ). Computer Standards & Interfaces, 89(January). https://doi.org/10.1016/j.csi.2024.103832
Griffin, P. H. (2015). Biometric Knowledge Extraction for Multi-Factor Authentication and Key Exchange. Procedia - Procedia Computer Science, 61, 66–71. https://doi.org/10.1016/j.procs.2015.09.150
Hindarto, D. (2023). The Management of Projects is Improved Through Enterprise Architecture on Project Management Application Systems. International Journal Software Engineering and Computer Science (IJSECS), 3(2 SE-Articles), 151–161. https://doi.org/10.35870/ijsecs.v3i2.1512
Hindarto, D., Indrajit, R. E., & Dazki, E. (2021). Sustainability of Implementing Enterprise Architecture in the Solar Power Generation Manufacturing Industry. Sinkron, 6(1), 13–24. https://doi.org/10.33395/sinkron.v6i1.11115
Imtiaz, S. I., Rehman, S. ur, Javed, A. R., Jalil, Z., Liu, X., & Alnumay, W. S. (2021). DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network. Future Generation Computer Systems, 115, 844–856. https://doi.org/10.1016/j.future.2020.10.008
Judijanto, L., & Hindarto, D. (2023). Edge of Enterprise Architecture in Addressing Cyber Security Threats and Business Risks. 3(December), 386–396.
Kilay, A. L., Simamora, B. H., & Putra, D. P. (2022). The Influence of E-Payment and E-Commerce Services on Supply Chain Performance: Implications of Open Innovation and Solutions for the Digitalization of Micro, Small, and Medium Enterprises (MSMEs) in Indonesia. Journal of Open Innovation: Technology, Market, and Complexity, 8(3), 119. https://doi.org/10.3390/joitmc8030119
Mittal, A., Gupta, M. P., Chaturvedi, M., Chansarkar, S. R., & Gupta, S. (2021). Cybersecurity Enhancement through Blockchain Training (CEBT) – A serious game approach. International Journal of Information Management Data Insights, 1(1). https://doi.org/10.1016/j.jjimei.2020.100001
Saleem, M., Warsi, M. R., & Islam, S. (2023). Secure information processing for multimedia forensics using zero-trust security model for large scale data analytics in SaaS cloud computing environment. Journal of Information Security and Applications, 72(December 2022). https://doi.org/10.1016/j.jisa.2022.103389 Available
Sengupta, B., & Lakshminarayanan, A. (2021). DistriTrust : Distributed and low-latency access validation in zero-trust architecture. Journal of Information Security and Applications, 63(October). https://doi.org/10.1016/j.jisa.2021.103023 Available
Singh, A., Kumar, R., Ali, A., & Balaji, P. (2023). Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT. Alexandria Engineering Journal, 81(July), 449–459. https://doi.org/10.1016/j.aej.2023.08.084
Sun, P., Liu, P., Li, Q., Liu, C., Lu, X., Hao, R., & Chen, J. (2020). DL-IDS: Extracting Features Using CNN-LSTM Hybrid Network for Intrusion Detection System. Security and Communication Networks, 2020, 8890306. https://doi.org/10.1155/2020/8890306
Wang, F., Gai, Y., & Zhang, H. (2024). Blockchain user digital identity big data and information security process protection based on network trust. Journal of King Saud University - Computer and Information Sciences, 36(April).
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2024 Abdul Rahman, Eko Indrajit, Akhmad Unggul, Erick Dazki
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.