Quantifying the Migration to Zero Trust Architecture: A Framework for Cloud-Based Mobile Network Enterprises
| dc.contributor.author | Khalid, Ali | |
| dc.contributor.department | fi=Tietotekniikan laitos|en=Department of Computing| | |
| dc.contributor.faculty | fi=Teknillinen tiedekunta|en=Faculty of Technology| | |
| dc.contributor.studysubject | fi=Tietotekniikka|en=Information and Communication Technology| | |
| dc.date.accessioned | 2025-05-21T21:06:17Z | |
| dc.date.available | 2025-05-21T21:06:17Z | |
| dc.date.issued | 2025-04-25 | |
| dc.description.abstract | The rapid adoption of 5G technology and cloud-based infrastructures has introduced new cybersecurity challenges for mobile network enterprises. Traditional perimeter-based security models are insufficient in addressing modern networks' dynamic and distributed nature. Zero Trust Architecture (ZTA) offers a security paradigm that eliminates implicit trust and enforces continuous verification across network assets. However, the migration process to ZTA in cloud-based mobile network environments presents unique challenges, requiring a structured and adaptable approach. This thesis proposes a comprehensive framework to guide the migration of cloud-based mobile network enterprises toward ZTA. The research identifies key challenges and requirements for Zero Trust adoption, emphasizing the complexities introduced by 5G-specific technologies such as network slicing, multi-access edge computing (MEC), and service-based architecture (SBA). The study presents a structured framework tailored to these challenges, ensuring a seamless transition while maintaining operational efficiency and security integrity. The framework is validated through its application to a theoretical cloud-based 5G network scenario, demonstrating its adaptability and effectiveness. The results highlight the critical processes involved in ZTA migration, including asset classification, segmentation strategies, policy enforcement mechanisms, and continuous monitoring. The proposed framework provides organizations with a strategic roadmap to systematically implement Zero Trust principles, ensuring enhanced security and resilience in dynamic 5G environments. | |
| dc.format.extent | 79 | |
| dc.identifier.olddbid | 198305 | |
| dc.identifier.oldhandle | 10024/181343 | |
| dc.identifier.uri | https://www.utupub.fi/handle/11111/25722 | |
| dc.identifier.urn | URN:NBN:fi-fe2025052149694 | |
| dc.language.iso | eng | |
| dc.rights | fi=Julkaisu on tekijänoikeussäännösten alainen. Teosta voi lukea ja tulostaa henkilökohtaista käyttöä varten. Käyttö kaupallisiin tarkoituksiin on kielletty.|en=This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.| | |
| dc.rights.accessrights | suljettu | |
| dc.source.identifier | https://www.utupub.fi/handle/10024/181343 | |
| dc.subject | Zero trust Architecture (ZTA), Cloud-Based Mobile Networks, 5G Technology, Cybersecurity, Migration Frameworks, ZTA Migration, Network Slicing, Multi-Access Edge Computing | |
| dc.title | Quantifying the Migration to Zero Trust Architecture: A Framework for Cloud-Based Mobile Network Enterprises | |
| dc.type.ontasot | fi=Diplomityö|en=Master's thesis| |
Tiedostot
1 - 1 / 1