Integrating Zero Trust and Human Elements for Enhanced Cloud Security

Mohamed Rajraji, Steve Simske, Anass Rabii

Abstract


This study investigates increasingly complex cyber threats that are challenging cloud environments as traditional protocols reach limitations. The rapid increase in cloud computing has exposed organizations to advanced cyber threats. This exposure has left them vulnerable to attacks that are large-scaled and complex. Conventional security models, which focus primarily on defending the perimeter, are not sufficient to meet the challenges posed by these changing threats. This situation requires a significant shift in cybersecurity strategies to ensure effective protection of cloud environments and to keep sensitive data safe. In response to these threats, we present an innovative methodology integrating Zero Trust principles with understanding of human factors for a versatile defense system closely aligned to nuances of conduct and culture.

Our approach offers comprehensive solutions designed to address the dynamic and sophisticated nature of cloud protection requirements. As cyber risks continue to intensify, our methodology stands out by providing adaptive and human-centric security solutions. It represents a step forward in addressing the evolving challenges in cloud computing security, ensuring that defenses remain robust and responsive to both technological and human dynamics.

Keywords: Human Factors, Zero Trust, Cloud Security, Cyber Threats, Adaptive Security Solutions, Vulnerability Exploitation, User-Centered Design, Behavioral Sciences, Cybersecurity Enhancements

DOI: 10.7176/ISDE/14-1-05

Publication date: April 30th 2024


Full Text: PDF
Download the IISTE publication guideline!

To list your conference here. Please contact the administrator of this platform.

Paper submission email: ISDE@iiste.org

ISSN (Paper)2222-1727 ISSN (Online)2222-2871

1Please add our address "contact@iiste.org" into your email contact list.

This journal follows ISO 9001 management standard and licensed under a Creative Commons Attribution 3.0 License.

Copyright © www.iiste.org