Zero Trust Network Architecture Design For Mid-Scale Organizations
DOI:
https://doi.org/10.37012/jtik.v12i1.3292Abstract
The development of information technology, the adoption of cloud-based services, and the implementation of remote work patterns increase network security risks in medium-sized organizations. Traditional network security approaches that focus on the perimeter are considered no longer adequate in facing increasingly complex cyber threats. This study presents the design of a Zero Trust Network (ZTN) architectural blueprint specifically designed for medium-sized organizations. The research method used is a conceptual approach through literature review, network security requirements analysis, and the design of the ZTN logical architecture. The research results are a Zero Trust Network architectural blueprint that emphasizes continuous verification, identity-based access control, and the application of the principles of least privilege and micro-segmentation. The architectural design is arranged in a modular and phased manner and is aligned with the NIST SP 800-207 framework, so it remains realistic for adoption without requiring drastic infrastructure changes. The resulting ZTN architectural blueprint can be used as an initial reference for medium-sized organizations in designing a Zero Trust-based network security strategy. This research is conceptual in nature and does not include the implementation stage or empirical testing in a real operational environment. It is hoped that the results of this study can serve as an initial reference for medium-sized organizations in designing a more adaptive and sustainable network security strategy.
Downloads
Published
Issue
Section
Citation Check
License
Copyright (c) 2026 Nurul Kamila, Makhsun, Sudarno

This work is licensed under a Creative Commons Attribution 4.0 International License.
Jurnal Teknologi Informatika dan Komputer allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles and allow readers to use them for any other lawful purpose. The journal allows the author(s) to hold the copyright without restrictions. Finally, the journal allows the author(s) to retain publishing rights without restrictions Authors are allowed to archive their submitted article in an open access repository Authors are allowed to archive the final published article in an open access repository with an acknowledgment of its initial publication in this journal.

Jurnal Teknlogi Informatika dan Komputer is licensed under a Creative Commons Attribution 4.0 International License.









