Show simple item record

dc.rights.licenseCC-BY-NC-ND
dc.contributor.advisorBrinkkemper, prof. dr. S.
dc.contributor.advisorSpruit, dr M.R.
dc.contributor.authorModderkolk, M.G.
dc.date.accessioned2018-06-29T17:01:27Z
dc.date.available2018-06-29T17:01:27Z
dc.date.issued2018
dc.identifier.urihttps://studenttheses.uu.nl/handle/20.500.12932/29189
dc.description.abstractSociety is getting more dependent from information technologies - which means that the Confidentiality, Integrity and Availability (CIA) must be guaranteed -, thus the cybersecurity of information systems needs to be improved. At the current date, the complexity of networks has increased exponentially. On top of that, networks will keep extending well outside the controllable borders of enterprises. To solve this problem, enterprises must start letting go of Trust but Verify and start embracing the Zero Trust principle. This research created a Zero Trust Maturity Model (ZeTuMM) that enterprises should use to start with the Zero Trust principles implementations, as well as grow in their Zero Trust maturity. After testing this model at various companies, this research serves as a road sign to continue the work on Zero Trust cybersecurity.
dc.description.sponsorshipUtrecht University
dc.format.extent1932941
dc.format.mimetypeapplication/pdf
dc.language.isoen_US
dc.titleZero Trust Maturity Matters: Modeling Cyber Security Focus Areas and Maturity Levels in the Zero Trust Principle
dc.type.contentMaster Thesis
dc.rights.accessrightsOpen Access
dc.subject.keywordsZero Trust, Maturity Model, Cybersecurity, Cyber Security, Information Security, Focus Areas
dc.subject.courseuuBusiness Informatics


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record