Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC)

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

This paper, titled “Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC),” addresses the critical cybersecurity challenges legacy systems pose. Legacy infrastructures, integral to numerous organizations, exhibit vulnerabilities due to obsolete security architectures. The paper proposes a novel approach by implementing a Zero Trust framework, incorporating dynamic microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC). The objective is to establish a resilient security posture that adapts to real-time network changes, user behaviour, and evolving threat landscapes. The paper encompasses a comprehensive literature review, prototype design, and critical evaluation. The technical artefact, a prototype, showcases the application of cutting-edge cybersecurity concepts tailored for legacy systems. Ethical considerations guide the responsible development and evaluation of the prototype. The paper's forward-looking approach, including recommendations for enhancements, positions it as a valuable contribution to advancing cybersecurity practices in legacy environments.
Original languageEnglish
Title of host publication2025 4th International Conference on Computing and Information Technology (ICCIT)
PublisherIEEE
Pages181-189
Number of pages9
ISBN (Electronic)9798350353839
DOIs
Publication statusPublished - 21 May 2025
Event4th International Conference on Computing and Information Technology - University of Tabuk, Tabuk City, Saudi Arabia
Duration: 13 Apr 202514 Apr 2025
https://ut-iccit.org/iccit/

Conference

Conference4th International Conference on Computing and Information Technology
Abbreviated titleICCIT
Country/TerritorySaudi Arabia
CityTabuk City
Period13/04/2514/04/25
Internet address

Fingerprint

Dive into the research topics of 'Zero Trust Implementation for Legacy Systems using Dynamic Microsegmentation, Role-Based Access Control (RBAC), and Attribute-Based Access Control (ABAC)'. Together they form a unique fingerprint.

Cite this