Abstract
This paper, titled “Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC),” addresses the critical cybersecurity challenges legacy systems pose. Legacy infrastructures, integral to numerous organizations, exhibit vulnerabilities due to obsolete security architectures. The paper proposes a novel approach by implementing a Zero Trust framework, incorporating dynamic microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). The objective is to establish a resilient security posture that adapts to real-time network changes, user behaviour, and evolving threat landscapes. The paper encompasses a comprehensive literature review, prototype design, and critical evaluation. The technical artefact, a prototype, showcases the application of cutting-edge cybersecurity concepts tailored for legacy systems. Ethical considerations guide the responsible development and evaluation of the prototype. The paper's forward-looking approach, including recommendations for enhancements, positions it as a valuable contribution to advancing cybersecurity practices in legacy environments.
| Original language | English |
|---|---|
| Title of host publication | 2025 4th International Conference on Computing and Information Technology (ICCIT) |
| Publisher | IEEE |
| Pages | 181-189 |
| Number of pages | 9 |
| ISBN (Electronic) | 9798350353839 |
| DOIs | |
| Publication status | Published - 21 May 2025 |
| Event | 4th International Conference on Computing and Information Technology - University of Tabuk, Tabuk City, Saudi Arabia Duration: 13 Apr 2025 → 14 Apr 2025 https://ut-iccit.org/iccit/ |
Conference
| Conference | 4th International Conference on Computing and Information Technology |
|---|---|
| Abbreviated title | ICCIT |
| Country/Territory | Saudi Arabia |
| City | Tabuk City |
| Period | 13/04/25 → 14/04/25 |
| Internet address |