Integration of Zero Trust Architecture Model in Cloud-Based Academic Information System Design
Keywords:
zero trust architecture, academic information systems, cloud security, multi-factor authentication, cloud-based education, access control, user adaptationAbstract
This study examines the application of Zero Trust Architecture (ZTA) in designing cloud-based academic information systems in educational institutions. With the increasing reliance on cloud-based systems, threats to sensitive data are increasingly a major concern. Zero Trust, which considers that every access is a potential threat, offers a stricter approach to data security. This study uses a qualitative approach with a case study design, involving in-depth interviews with IT teams, system administrators, and system users (lecturers and students) at three universities that have implemented ZTA. The results show that ZTA's implementation has improved access control and reduced the risk of data leakage, but the main challenge is the user's adaptation to more stringent authentication procedures. Although data security is improved, user convenience is slightly affected by the more complicated verification process. This study suggests the need for more intensive training and socialization to improve user understanding of ZTA, as well as the development of systems that balance security and convenience. These findings are expected to provide guidance for educational institutions in adopting ZTA to improve the security of cloud-based academic information systems.